CVE-2024-39318
CVSS V2 None
CVSS V3 None
Description
The Ibexa Admin UI Bundle contains all the necessary parts to run the Ibexa DXP Back Office interface. The file upload widget is vulnerable to XSS payloads in filenames. Access permission to upload files is required. As such, in most cases only authenticated editors and administrators will have the required permission. It is not persistent, i.e. the payload is only executed during the upload. In effect, an attacker will have to trick an editor/administrator into uploading a strangely named file.
Overview
- CVE ID
- CVE-2024-39318
- Assigner
- GitHub_M
- Vulnerability Status
- PUBLISHED
- Published Version
- 2024-07-31T15:38:48.237Z
- Last Modified Date
- 2024-07-31T15:38:48.237Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://github.com/ibexa/admin-ui/security/advisories/GHSA-qm44-wjm2-pr59 | x_refsource_CONFIRM |
https://github.com/ezsystems/ezplatform-admin-ui/security/advisories/GHSA-gc5h-6jx9-q2qh | x_refsource_MISC |
https://github.com/ezsystems/ezplatform-admin-ui/commit/7a9f991b200fa5a03d49cd07f50577c8bc90a30b | x_refsource_MISC |
https://github.com/ibexa/admin-ui/commit/8dc413fad1045fcfbe65dbcb0bea8516accc4c3e | x_refsource_MISC |
https://developers.ibexa.co/security-advisories/ibexa-sa-2024-004-dom-based-xss-in-file-upload | x_refsource_MISC |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2024-39318 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39318 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-08-01 13:16:06 | Added to TrackCVE |