CVE-2024-6229

A stored cross-site scripting (XSS) vulnerability exists in the 'Upload Knowledge' feature of stangirard/quivr, affecting the latest version. Users can upload files via URL, which allows the insertion of malicious JavaScript payloads. These payloads are stored on the server and executed whenever any user clicks on a link containing the payload, leading to potential data theft, session hijacking, and reputation damage.
Configurations

Configuration 1 (hide)

cpe:2.3:a:quivr:quivr:*:*:*:*:*:*:*:*

History

21 Nov 2024, 09:49

Type Values Removed Values Added
References () https://huntr.com/bounties/2ee71e9e-2cf5-41a4-8440-d75758018786 - Exploit () https://huntr.com/bounties/2ee71e9e-2cf5-41a4-8440-d75758018786 - Exploit

11 Jul 2024, 15:03

Type Values Removed Values Added
References () https://huntr.com/bounties/2ee71e9e-2cf5-41a4-8440-d75758018786 - () https://huntr.com/bounties/2ee71e9e-2cf5-41a4-8440-d75758018786 - Exploit
CPE cpe:2.3:a:quivr:quivr:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : 6.8
v2 : unknown
v3 : 5.4
First Time Quivr quivr
Quivr

08 Jul 2024, 15:49

Type Values Removed Values Added
Summary
  • (es) Existe una vulnerabilidad de Cross Site Scripting (XSS) almacenado en la función 'Upload Knowledge' de stangirard/quivr, que afecta a la última versión. Los usuarios pueden cargar archivos a través de URL, lo que permite la inserción de payloads de JavaScript maliciosos. Estos payloads se almacenan en el servidor y se ejecutan cada vez que un usuario hace clic en un enlace que contiene el payload, lo que genera un posible robo de datos, secuestro de sesiones y daños a la reputación.

07 Jul 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-07 16:15

Updated : 2024-11-21 09:49


NVD link : CVE-2024-6229

Mitre link : CVE-2024-6229

CVE.ORG link : CVE-2024-6229


JSON object : View

Products Affected

quivr

  • quivr
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')