Executive Summary

Informations
Name CVE-2024-47610 First vendor Publication 2024-10-07
Vendor Cve Last vendor Modification 2024-10-10

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

InvenTree is an Open Source Inventory Management System. In affected versions of InvenTree it is possible for a registered user to store javascript in markdown notes fields, which are then displayed to other logged in users who visit the same page and executed. The vulnerability has been addressed as follows: 1. HTML sanitization has been enabled in the front-end markdown rendering library - `easymde`. 2. Stored markdown is also validated on the backend, to ensure that malicious markdown is not stored in the database. These changes are available in release versions 0.16.5 and later. All users are advised to upgrade. There are no workarounds, an update is required to get the new validation functions.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47610

Sources (Detail)

https://github.com/inventree/InvenTree/commit/6e37f0cd8ba5fc527412f18f66cd6a3...
https://github.com/inventree/InvenTree/security/advisories/GHSA-wp3m-jhgv-rhqr
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
Date Informations
2024-11-25 14:13:02
  • Multiple Updates
2024-10-10 17:27:29
  • Multiple Updates
2024-10-08 00:27:29
  • First insertion