CVE-2024-3798

Insecure handling of GET header parameter file included in requests being sent to an instance of the open-source project Phoniebox allows an attacker to create a website, which – when visited by a user – will send malicious requests to multiple hosts on the local network. If such a request reaches the server, it will cause one of the following (depending on the chosen payload): shell command execution, reflected XSS or cross-site request forgery. This issue affects Phoniebox in all releases through 2.7. Newer 2.x releases were not tested, but they might also be vulnerable.  Phoniebox in version 3.0 and higher are not affected.
CVSS

No CVSS.

Configurations

No configuration.

History

21 Nov 2024, 09:30

Type Values Removed Values Added
References () https://cert.pl/en/posts/2024/07/CVE-2024-3798 - () https://cert.pl/en/posts/2024/07/CVE-2024-3798 -
References () https://cert.pl/posts/2024/07/CVE-2024-3798 - () https://cert.pl/posts/2024/07/CVE-2024-3798 -
References () https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2342 - () https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2342 -

12 Jul 2024, 10:15

Type Values Removed Values Added
Summary (en) Insecure handling of GET header parameter file included in requests being sent to an instance of the open-source project Phoniebox allows an attacker to create a website, which – when visited by a user – will send malicious requests to multiple hosts on the local network. If such a request reaches the server, it will cause one of the following (depending on the chosen payload): shell command execution, reflected XSS or cross-site request forgery. This issue affects Phoniebox in all releases through 2.7. Newer releases were not tested, but they might also be vulnerable. (en) Insecure handling of GET header parameter file included in requests being sent to an instance of the open-source project Phoniebox allows an attacker to create a website, which – when visited by a user – will send malicious requests to multiple hosts on the local network. If such a request reaches the server, it will cause one of the following (depending on the chosen payload): shell command execution, reflected XSS or cross-site request forgery. This issue affects Phoniebox in all releases through 2.7. Newer 2.x releases were not tested, but they might also be vulnerable.  Phoniebox in version 3.0 and higher are not affected.

11 Jul 2024, 13:05

Type Values Removed Values Added
Summary
  • (es) El manejo inseguro del archivo de parámetros de encabezado GET incluido en las solicitudes que se envían a una instancia del proyecto de código abierto Phoniebox permite a un atacante crear un sitio web que, cuando lo visita un usuario, enviará solicitudes maliciosas a múltiples hosts en la red local. Si dicha solicitud llega al servidor, provocará una de las siguientes situaciones (según el payload elegido): ejecución de comandos de shell, XSS reflejado o cross-site request forgery. Este problema afecta a Phoniebox en todas las versiones hasta la 2.7. Las versiones más recientes no se probaron, pero también podrían ser vulnerables.

10 Jul 2024, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-10 12:15

Updated : 2024-11-21 09:30


NVD link : CVE-2024-3798

Mitre link : CVE-2024-3798

CVE.ORG link : CVE-2024-3798


JSON object : View

Products Affected

No product.

CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-352

Cross-Site Request Forgery (CSRF)