Products
Phoniebox
- <= 2.7
Source
cvd@cert.pl
Tags
CVE-2024-3798 details
Published : July 10, 2024, 12:15 p.m.
Last Modified : July 10, 2024, 12:15 p.m.
Last Modified : July 10, 2024, 12:15 p.m.
Description
Insecure handling of GET header parameter file included in requests being sent to an instance of the open-source project Phoniebox allows an attacker to create a website, which – when visited by a user – will send malicious requests to multiple hosts on the local network. If such a request reaches the server, it will cause one of the following (depending on the chosen payload): shell command execution, reflected XSS or cross-site request forgery. This issue affects Phoniebox in all releases through 2.7. Newer releases were not tested, but they might also be vulnerable.
CVSS Score
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|---|---|
CWE-352 | Cross-Site Request Forgery (CSRF) | The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request. |
References
URL | Source |
---|---|
https://cert.pl/en/posts/2024/07/CVE-2024-3798 | cvd@cert.pl |
https://cert.pl/posts/2024/07/CVE-2024-3798 | cvd@cert.pl |
https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2342 | cvd@cert.pl |
This website uses the NVD API, but is not approved or certified by it.