OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versions up until and including 1.9.3 contain a vulnerability that allows malicious admins to configure or talk a victim with administrator rights into configuring a webcam snapshot URL which when tested through the "Test" button included in the web interface will execute JavaScript code in the victims browser when attempting to render the snapshot image. An attacker who successfully talked a victim with admin rights into performing a snapshot test with such a crafted URL could use this to retrieve or modify sensitive configuration settings, interrupt prints or otherwise interact with the OctoPrint instance in a malicious way. The vulnerability is patched in version 1.10.0rc3. OctoPrint administrators are strongly advised to thoroughly vet who has admin access to their installation and what settings they modify based on instructions by strangers.
References
Configurations
No configuration.
History
21 Nov 2024, 09:06
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/OctoPrint/OctoPrint/commit/779894c1bc6478332d14bc9ed1006df1354eb517 - | |
References | () https://github.com/OctoPrint/OctoPrint/security/advisories/GHSA-x7mf-wrh9-r76c - |
19 Mar 2024, 13:26
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
18 Mar 2024, 22:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-03-18 22:15
Updated : 2024-11-21 09:06
NVD link : CVE-2024-28237
Mitre link : CVE-2024-28237
CVE.ORG link : CVE-2024-28237
JSON object : View
Products Affected
No product.
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')