CVE-2024-51486

Ampache is a web based audio/video streaming application and file manager. The vulnerability exists in the interface section of the Ampache menu, where users can change the "Custom URL - Favicon". This section is not properly sanitized, allowing for the input of strings that can execute JavaScript. This issue has been addressed in version 7.0.1 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:ampache:ampache:7.0.0:*:*:*:*:*:*:*

History

21 Nov 2024, 09:45

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 8.4
v2 : unknown
v3 : 5.5
Summary (en) Ampache is a web based audio/video streaming application and file manager. The vulnerability exists in the interface section of the Ampache menu, where users can change the "Custom URL?-?Favicon". This section is not properly sanitized, allowing for the input of strings that can execute JavaScript. This issue has been addressed in version 7.0.1 and all users are advised to upgrade. There are no known workarounds for this vulnerability. (en) Ampache is a web based audio/video streaming application and file manager. The vulnerability exists in the interface section of the Ampache menu, where users can change the "Custom URL - Favicon". This section is not properly sanitized, allowing for the input of strings that can execute JavaScript. This issue has been addressed in version 7.0.1 and all users are advised to upgrade. There are no known workarounds for this vulnerability.

14 Nov 2024, 19:55

Type Values Removed Values Added
First Time Ampache
Ampache ampache
CVSS v2 : unknown
v3 : 5.5
v2 : unknown
v3 : 8.4
References () https://github.com/ampache/ampache/security/advisories/GHSA-4xw5-f7xm-vpw5 - () https://github.com/ampache/ampache/security/advisories/GHSA-4xw5-f7xm-vpw5 - Exploit, Third Party Advisory
CPE cpe:2.3:a:ampache:ampache:7.0.0:*:*:*:*:*:*:*

12 Nov 2024, 13:55

Type Values Removed Values Added
Summary
  • (es) Ampache es una aplicación de transmisión de audio y video basada en la web y un administrador de archivos. La vulnerabilidad existe en la sección de interfaz del menú de Ampache, donde los usuarios pueden cambiar la "URL personalizada - Favicono". Esta sección no está debidamente desinfectada, lo que permite la entrada de cadenas que pueden ejecutar JavaScript. Este problema se ha solucionado en la versión 7.0.1 y se recomienda a todos los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad.
Summary (en) Ampache is a web based audio/video streaming application and file manager. The vulnerability exists in the interface section of the Ampache menu, where users can change the "Custom URL - Favicon". This section is not properly sanitized, allowing for the input of strings that can execute JavaScript. This issue has been addressed in version 7.0.1 and all users are advised to upgrade. There are no known workarounds for this vulnerability. (en) Ampache is a web based audio/video streaming application and file manager. The vulnerability exists in the interface section of the Ampache menu, where users can change the "Custom URL?-?Favicon". This section is not properly sanitized, allowing for the input of strings that can execute JavaScript. This issue has been addressed in version 7.0.1 and all users are advised to upgrade. There are no known workarounds for this vulnerability.

11 Nov 2024, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-11-11 20:15

Updated : 2024-11-21 09:45


NVD link : CVE-2024-51486

Mitre link : CVE-2024-51486

CVE.ORG link : CVE-2024-51486


JSON object : View

Products Affected

ampache

  • ampache
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')