Lucene search

K
cve[email protected]CVE-2024-1020
HistoryJan 29, 2024 - 10:15 p.m.

CVE-2024-1020

2024-01-2922:15:08
CWE-79
web.nvd.nist.gov
12
vulnerability
rebuild
3.5.5
remote
cross site scripting
url manipulation
security advisory

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:S/C:N/I:P/A:N

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

6 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

20.7%

A vulnerability classified as problematic was found in Rebuild up to 3.5.5. Affected by this vulnerability is the function getStorageFile of the file /filex/proxy-download. The manipulation of the argument url leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-252289 was assigned to this vulnerability.

Affected configurations

Vulners
NVD
Node
rebuild_projectrebuildMatch3.5.0
OR
rebuild_projectrebuildMatch3.5.1
OR
rebuild_projectrebuildMatch3.5.2
OR
rebuild_projectrebuildMatch3.5.3
OR
rebuild_projectrebuildMatch3.5.4
OR
rebuild_projectrebuildMatch3.5.5
VendorProductVersionCPE
rebuild_projectrebuild3.5.0cpe:2.3:a:rebuild_project:rebuild:3.5.0:*:*:*:*:*:*:*
rebuild_projectrebuild3.5.1cpe:2.3:a:rebuild_project:rebuild:3.5.1:*:*:*:*:*:*:*
rebuild_projectrebuild3.5.2cpe:2.3:a:rebuild_project:rebuild:3.5.2:*:*:*:*:*:*:*
rebuild_projectrebuild3.5.3cpe:2.3:a:rebuild_project:rebuild:3.5.3:*:*:*:*:*:*:*
rebuild_projectrebuild3.5.4cpe:2.3:a:rebuild_project:rebuild:3.5.4:*:*:*:*:*:*:*
rebuild_projectrebuild3.5.5cpe:2.3:a:rebuild_project:rebuild:3.5.5:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "n/a",
    "product": "Rebuild",
    "versions": [
      {
        "version": "3.5.0",
        "status": "affected"
      },
      {
        "version": "3.5.1",
        "status": "affected"
      },
      {
        "version": "3.5.2",
        "status": "affected"
      },
      {
        "version": "3.5.3",
        "status": "affected"
      },
      {
        "version": "3.5.4",
        "status": "affected"
      },
      {
        "version": "3.5.5",
        "status": "affected"
      }
    ]
  }
]

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:S/C:N/I:P/A:N

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

6 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

20.7%

Related for CVE-2024-1020