CVE-2024-28852

Ampache is a web based audio/video streaming application and file manager. Ampache has multiple reflective XSS vulnerabilities,this means that all forms in the Ampache that use `rule` as a variable are not secure. For example, when querying a song, when querying a podcast, we need to use `$rule` variable. This vulnerability is fixed in 6.3.1
Configurations

No configuration.

History

21 Nov 2024, 09:07

Type Values Removed Values Added
References () https://github.com/ampache/ampache/blob/bcaa9a4624acf8c8cc4c135be77b846731fb1ba2/src/Repository/Model/Search.php#L1732-L1740 - () https://github.com/ampache/ampache/blob/bcaa9a4624acf8c8cc4c135be77b846731fb1ba2/src/Repository/Model/Search.php#L1732-L1740 -
References () https://github.com/ampache/ampache/security/advisories/GHSA-g7hx-hm68-f639 - () https://github.com/ampache/ampache/security/advisories/GHSA-g7hx-hm68-f639 -
Summary
  • (es) Ampache es una aplicación de transmisión de audio/vídeo y un administrador de archivos basado en web. Ampache tiene múltiples vulnerabilidades XSS reflectantes, lo que significa que todos los formularios en Ampache que usan "regla" como variable no son seguros. Por ejemplo, al consultar una canción, al consultar un podcast, necesitamos usar la variable `$rule`. Esta vulnerabilidad se solucionó en 6.3.1.

27 Mar 2024, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-27 14:15

Updated : 2024-11-21 09:07


NVD link : CVE-2024-28852

Mitre link : CVE-2024-28852

CVE.ORG link : CVE-2024-28852


JSON object : View

Products Affected

No product.

CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')