We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-1020

Rebuild proxy-download getStorageFile cross site scripting



Description

EN DE

A vulnerability classified as problematic was found in Rebuild up to 3.5.5. Affected by this vulnerability is the function getStorageFile of the file /filex/proxy-download. The manipulation of the argument url leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-252289 was assigned to this vulnerability.

In Rebuild bis 3.5.5 wurde eine problematische Schwachstelle entdeckt. Hierbei betrifft es die Funktion getStorageFile der Datei /filex/proxy-download. Durch Manipulation des Arguments url mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Der Exploit steht zur öffentlichen Verfügung.

Reserved 2024-01-29 | Published 2024-01-29 | Updated 2024-10-18 | Assigner VulDB


LOW: 3.5CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N
LOW: 3.5CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N
4.0AV:N/AC:L/Au:S/C:N/I:P/A:N

Problem types

CWE-79 Cross Site Scripting

Timeline

2024-01-29:Advisory disclosed
2024-01-29:VulDB entry created
2024-01-29:VulDB entry last update

Credits

lemono (VulDB User) reporter

References

vuldb.com/?id.252289 vdb-entry technical-description

vuldb.com/?ctiid.252289 signature permissions-required

www.yuque.com/mailemonyeyongjuan/tha8tr/gdd3hiwz8uo6ylab exploit

cve.org (CVE-2024-1020)

nvd.nist.gov (CVE-2024-1020)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2024-1020

Support options

Helpdesk Chat, Email, Knowledgebase