// For flags

CVE-2024-51735

Stored Cross-site Scripting to RCE on Osmedeus Web Server

Severity Score

8.7
*CVSS v4

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Attend
*SSVC
Descriptions

Osmedeus is a Workflow Engine for Offensive Security. Cross-site Scripting (XSS) occurs on the Osmedues web server when viewing results from the workflow, allowing commands to be executed on the server. When using a workflow that contains the summary module, it generates reports in HTML and Markdown formats. The default report is based on the `general-template.md` template.The contents of the files are read and used to generate the report. However, the file contents are not properly filtered, leading to XSS. This may lead to commands executed on the host as well. This issue is not yet resolved. Users are advised to add their own filtering or to reach out to the developer to aid in developing a patch.

Osmedeus es un motor de workflow para seguridad ofensiva. Se produce un ataque de Cross Site Scripting (XSS) en el servidor web de Osmedeus cuando se visualizan los resultados del workflow, lo que permite ejecutar comandos en el servidor. Cuando se utiliza un workflow que contiene el módulo de resumen, se generan informes en formatos HTML y Markdown. El informe predeterminado se basa en la plantilla `general-template.md`. Se leen los contenidos de los archivos y se utilizan para generar el informe. Sin embargo, los contenidos de los archivos no se filtran correctamente, lo que genera un ataque de Cross Site Scripting (XSS). Esto también puede provocar la ejecución de comandos en el host. Este problema aún no se ha resuelto. Se recomienda a los usuarios que agreguen su propio filtrado o que se pongan en contacto con el desarrollador para que les ayude a desarrollar un parche.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Attack Requirements
None
Privileges Required
None
User Interaction
Passive
System
Vulnerable | Subsequent
Confidentiality
High
None
Integrity
High
None
Availability
High
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Attend
Exploitation
None
Automatable
Yes
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2024-10-31 CVE Reserved
  • 2024-11-05 CVE Published
  • 2024-11-05 CVE Updated
  • 2024-11-06 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
  • CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
CAPEC
References (1)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
J3ssie
Search vendor "J3ssie"
Osmedeus
Search vendor "J3ssie" for product "Osmedeus"
<= 4.6.4
Search vendor "J3ssie" for product "Osmedeus" and version " <= 4.6.4"
en
Affected