Products
Passbolt API
- before 4.6.2
Source
cve@mitre.org
Tags
CVE-2024-33670 details
Published : April 26, 2024, 1:15 a.m.
Last Modified : April 26, 2024, 12:58 p.m.
Last Modified : April 26, 2024, 12:58 p.m.
Description
Passbolt API before 4.6.2 allows HTML injection in a URL parameter, resulting in custom content being displayed when a user visits the crafted URL. Although the injected content is not executed as JavaScript due to Content Security Policy (CSP) restrictions, it may still impact the appearance and user interaction of the page.
CVSS Score
1 | 2 | 3 | 4.3 | 5 | 6 | 7 | 8 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|
CVSS Data
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
NONE
Base Score
4.3
Exploitability Score
Impact Score
Base Severity
MEDIUM
Vector String : CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
References
URL | Source |
---|---|
https://help.passbolt.com/incidents/reflective-html-injection-vulnerability | cve@mitre.org |
https://www.passbolt.com/incidents | cve@mitre.org |
https://www.passbolt.com/security/more | cve@mitre.org |
This website uses the NVD API, but is not approved or certified by it.