Ampache is a web based audio/video streaming application and file manager. This vulnerability exists in the interface section of the Ampache menu, where users can change "Custom URL - Logo". This section is not properly sanitized, allowing for the input of strings that can execute JavaScript. This issue has been addressed in version 7.0.1 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
References
Link | Resource |
---|---|
https://github.com/ampache/ampache/security/advisories/GHSA-x979-f6px-7j2w | Exploit Third Party Advisory |
Configurations
History
14 Nov 2024, 20:13
Type | Values Removed | Values Added |
---|---|---|
First Time |
Ampache
Ampache ampache |
|
CPE | cpe:2.3:a:ampache:ampache:7.0.0:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.0 |
References | () https://github.com/ampache/ampache/security/advisories/GHSA-x979-f6px-7j2w - Exploit, Third Party Advisory |
12 Nov 2024, 13:55
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
11 Nov 2024, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-11-11 20:15
Updated : 2024-11-14 20:13
NVD link : CVE-2024-51490
Mitre link : CVE-2024-51490
CVE.ORG link : CVE-2024-51490
JSON object : View
Products Affected
ampache
- ampache
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')