// For flags

CVE-2024-52597

2FAuth vulnerable to stored cross-site scripting via SVG upload and direct access render

Severity Score

6.1
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track*
*SSVC
Descriptions

2FAuth is a web app to manage Two-Factor Authentication (2FA) accounts and generate their security codes. Versions prior to 5.4.1 are vulnerable to stored cross-site scripting due to improper headers in direct access to uploaded SVGs. The application allows uploading images in several places. One of the accepted types of image is SVG, which allows JS scripting. Therefore, by uploading a malicious SVG which contains JS code, an attacker which is able to drive a victim to the uploaded image could compromise that victim's session and access to their tokens. Version 5.4.1 contains a patch for the issue.

2FAuth es una aplicación web para administrar cuentas de autenticación de dos factores (2FA) y generar sus códigos de seguridad. Las versiones anteriores a la 5.4.1 son vulnerables a cross site scripting almacenado debido a encabezados incorrectos en el acceso directo a los SVG cargados. La aplicación permite cargar imágenes en varios lugares. Uno de los tipos de imagen aceptados es el SVG, que permite la creación de secuencias de comandos JS. Por lo tanto, al cargar un SVG malicioso que contiene código JS, un atacante que pueda llevar a una víctima a la imagen cargada podría comprometer la sesión de esa víctima y el acceso a sus tokens. La versión 5.4.1 contiene un parche para el problema.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Track*
Exploitation
Poc
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2024-11-14 CVE Reserved
  • 2024-11-20 CVE Published
  • 2024-11-20 CVE Updated
  • 2024-11-21 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
  • CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Bubka
Search vendor "Bubka"
2FAuth
Search vendor "Bubka" for product "2FAuth"
< 5.4.1
Search vendor "Bubka" for product "2FAuth" and version " < 5.4.1"
en
Affected