Lucene search

K
cve[email protected]CVE-2024-1099
HistoryJan 31, 2024 - 12:16 p.m.

CVE-2024-1099

2024-01-3112:16:04
CWE-79
web.nvd.nist.gov
16
vulnerability
rebuild
3.5.5
getfileofdata
cross-site scripting
cve-2024-1099
nvd
vdb-252456

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:S/C:N/I:P/A:N

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

5.2 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

19.9%

A vulnerability was found in Rebuild up to 3.5.5. It has been classified as problematic. Affected is the function getFileOfData of the file /filex/read-raw. The manipulation of the argument url leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-252456.

Affected configurations

Vulners
NVD
Node
rebuild_projectrebuildMatch3.5.0
OR
rebuild_projectrebuildMatch3.5.1
OR
rebuild_projectrebuildMatch3.5.2
OR
rebuild_projectrebuildMatch3.5.3
OR
rebuild_projectrebuildMatch3.5.4
OR
rebuild_projectrebuildMatch3.5.5
VendorProductVersionCPE
rebuild_projectrebuild3.5.0cpe:2.3:a:rebuild_project:rebuild:3.5.0:*:*:*:*:*:*:*
rebuild_projectrebuild3.5.1cpe:2.3:a:rebuild_project:rebuild:3.5.1:*:*:*:*:*:*:*
rebuild_projectrebuild3.5.2cpe:2.3:a:rebuild_project:rebuild:3.5.2:*:*:*:*:*:*:*
rebuild_projectrebuild3.5.3cpe:2.3:a:rebuild_project:rebuild:3.5.3:*:*:*:*:*:*:*
rebuild_projectrebuild3.5.4cpe:2.3:a:rebuild_project:rebuild:3.5.4:*:*:*:*:*:*:*
rebuild_projectrebuild3.5.5cpe:2.3:a:rebuild_project:rebuild:3.5.5:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "n/a",
    "product": "Rebuild",
    "versions": [
      {
        "version": "3.5.0",
        "status": "affected"
      },
      {
        "version": "3.5.1",
        "status": "affected"
      },
      {
        "version": "3.5.2",
        "status": "affected"
      },
      {
        "version": "3.5.3",
        "status": "affected"
      },
      {
        "version": "3.5.4",
        "status": "affected"
      },
      {
        "version": "3.5.5",
        "status": "affected"
      }
    ]
  }
]

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:S/C:N/I:P/A:N

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

5.2 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

19.9%

Related for CVE-2024-1099