OctoPrint before 1.6.0 allows XSS because API error messages include the values of input parameters.
References
Link | Resource |
---|---|
https://github.com/OctoPrint/OctoPrint/releases/tag/1.6.0 | Release Notes Third Party Advisory |
https://octoprint.org/blog/2021/04/27/new-release-1.6.0/ | Release Notes Third Party Advisory |
https://www.brzozowski.io/web-applications/2021/05/11/the-insecure-story-of-octoprint.html | Exploit Third Party Advisory |
https://github.com/OctoPrint/OctoPrint/releases/tag/1.6.0 | Release Notes Third Party Advisory |
https://octoprint.org/blog/2021/04/27/new-release-1.6.0/ | Release Notes Third Party Advisory |
https://www.brzozowski.io/web-applications/2021/05/11/the-insecure-story-of-octoprint.html | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 06:07
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/OctoPrint/OctoPrint/releases/tag/1.6.0 - Release Notes, Third Party Advisory | |
References | () https://octoprint.org/blog/2021/04/27/new-release-1.6.0/ - Release Notes, Third Party Advisory | |
References | () https://www.brzozowski.io/web-applications/2021/05/11/the-insecure-story-of-octoprint.html - Exploit, Third Party Advisory |
Information
Published : 2021-05-11 14:15
Updated : 2024-11-21 06:07
NVD link : CVE-2021-32561
Mitre link : CVE-2021-32561
CVE.ORG link : CVE-2021-32561
JSON object : View
Products Affected
octoprint
- octoprint
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')