CVE-2024-36819

MAP-OS 4.45.0 and earlier is vulnerable to Cross-Site Scripting (XSS). This vulnerability allows malicious users to insert a malicious payload into the "Client Name" input. When a service order from this client is created, the malicious payload is displayed on the administrator and employee dashboards, resulting in unauthorized script execution whenever the dashboard is loaded.
Configurations

No configuration.

History

21 Nov 2024, 09:22

Type Values Removed Values Added
References () https://github.com/RamonSilva20/mapos/commit/3559bae4782162faab94670f503fd35b0f331929 - () https://github.com/RamonSilva20/mapos/commit/3559bae4782162faab94670f503fd35b0f331929 -
References () https://github.com/RamonSilva20/mapos/tree/master - () https://github.com/RamonSilva20/mapos/tree/master -

01 Nov 2024, 16:35

Type Values Removed Values Added
CWE CWE-79
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.4

26 Jun 2024, 12:44

Type Values Removed Values Added
Summary
  • (es) MAP-OS 4.45.0 y versiones anteriores son vulnerables a Cross-Site Scripting (XSS). Esta vulnerabilidad permite a usuarios malintencionados insertar un payload malicioso en la entrada "Nombre del cliente". Cuando se crea una orden de servicio de este cliente, el payload malicioso se muestra en los paneles de administrador y de empleado, lo que resulta en la ejecución de scripts no autorizados cada vez que se carga el panel.

25 Jun 2024, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-25 19:15

Updated : 2024-11-21 09:22


NVD link : CVE-2024-36819

Mitre link : CVE-2024-36819

CVE.ORG link : CVE-2024-36819


JSON object : View

Products Affected

No product.

CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')