CVE-2024-33670
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Passbolt API before 4.6.2 allows HTML injection in a URL parameter, resulting in custom content being displayed when a user visits the crafted URL. Although the injected content is not executed as JavaScript due to Content Security Policy (CSP) restrictions, it may still impact the appearance and user interaction of the page.
Passbolt API anterior a 4.6.2 permite la inyección de HTML en un parámetro de URL, lo que da como resultado que se muestre contenido personalizado cuando un usuario visita la URL manipulada. Aunque el contenido inyectado no se ejecuta como JavaScript debido a las restricciones de la Política de seguridad de contenido (CSP), aún puede afectar la apariencia y la interacción del usuario de la página.
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2024-04-26 CVE Reserved
- 2024-04-26 CVE Published
- 2024-04-26 EPSS Updated
- 2024-08-02 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
https://help.passbolt.com/incidents/reflective-html-injection-vulnerability | ||
https://www.passbolt.com/incidents | ||
https://www.passbolt.com/security/more |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Passbolt Search vendor "Passbolt" | Passbolt Api Search vendor "Passbolt" for product "Passbolt Api" | * | - |
Affected
|