** DISPUTED ** A vulnerability, which was classified as problematic, has been found in NetBox up to 3.7.0. This issue affects some unknown processing of the file /core/config-revisions of the component Home Page Configuration. The manipulation with the input <<h1 onload=alert(1)>>test</h1> leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The associated identifier of this vulnerability is VDB-252191. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
References
Link | Resource |
---|---|
https://drive.google.com/file/d/1tcgyzu9Fh3AMG0INR0EdOR7ZjWmBK0ZR/view?usp=sharing | Exploit |
https://vuldb.com/?ctiid.252191 | Permissions Required |
https://vuldb.com/?id.252191 | Third Party Advisory |
https://vuldb.com/?submit.270218 | |
https://drive.google.com/file/d/1tcgyzu9Fh3AMG0INR0EdOR7ZjWmBK0ZR/view?usp=sharing | Exploit |
https://vuldb.com/?ctiid.252191 | Permissions Required |
https://vuldb.com/?id.252191 | Third Party Advisory |
https://vuldb.com/?submit.270218 |
Configurations
History
21 Nov 2024, 08:47
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 3.3
v3 : 2.4 |
References | () https://drive.google.com/file/d/1tcgyzu9Fh3AMG0INR0EdOR7ZjWmBK0ZR/view?usp=sharing - Exploit | |
References | () https://vuldb.com/?ctiid.252191 - Permissions Required | |
References | () https://vuldb.com/?id.252191 - Third Party Advisory | |
References | () https://vuldb.com/?submit.270218 - |
16 Apr 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | (en) ** DISPUTED ** A vulnerability, which was classified as problematic, has been found in NetBox up to 3.7.0. This issue affects some unknown processing of the file /core/config-revisions of the component Home Page Configuration. The manipulation with the input <<h1 onload=alert(1)>>test</h1> leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The associated identifier of this vulnerability is VDB-252191. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. |
02 Feb 2024, 14:20
Type | Values Removed | Values Added |
---|---|---|
First Time |
Netbox netbox
Netbox |
|
References | () https://drive.google.com/file/d/1tcgyzu9Fh3AMG0INR0EdOR7ZjWmBK0ZR/view?usp=sharing - Exploit | |
References | () https://vuldb.com/?id.252191 - Third Party Advisory | |
References | () https://vuldb.com/?ctiid.252191 - Permissions Required | |
CPE | cpe:2.3:a:netbox:netbox:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.1 |
26 Jan 2024, 22:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-01-26 22:15
Updated : 2024-11-21 08:47
NVD link : CVE-2024-0948
Mitre link : CVE-2024-0948
CVE.ORG link : CVE-2024-0948
JSON object : View
Products Affected
netbox
- netbox
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')