CVE-2024-5405

A vulnerability had been discovered in WinNMP 19.02 consisting of an XSS attack via /tools/redis.php page in the k, hash, key and p parameters. This vulnerability could allow a remote user to submit a specially crafted JavaScript payload for an authenticated user to retrieve their session details.
Configurations

No configuration.

History

21 Nov 2024, 09:47

Type Values Removed Values Added
References () https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-winnmp-wtriple - () https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-winnmp-wtriple -

28 May 2024, 12:39

Type Values Removed Values Added
Summary
  • (es) Se descubrió una vulnerabilidad en WinNMP 19.02 que consiste en un ataque XSS a través de la página /tools/redis.php en los parámetros k, hash, key y p. Esta vulnerabilidad podría permitir que un usuario remoto envíe un payload de JavaScript especialmente manipulado para que un usuario autenticado recupere los detalles de su sesión.

27 May 2024, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-27 12:15

Updated : 2024-11-21 09:47


NVD link : CVE-2024-5405

Mitre link : CVE-2024-5405

CVE.ORG link : CVE-2024-5405


JSON object : View

Products Affected

No product.

CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')