Lucene search

K
cveGitHub_MCVE-2024-28100
HistorySep 02, 2024 - 6:15 p.m.

CVE-2024-28100

2024-09-0218:15:22
CWE-79
GitHub_M
web.nvd.nist.gov
28
elabftw
remote code execution
privilege escalation
unauthorized access
security vulnerability
upgrade.

CVSS3

8.9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L

AI Score

8.6

Confidence

High

EPSS

0

Percentile

14.7%

eLabFTW is an open source electronic lab notebook for research labs. By uploading specially crafted files, a regular user can create a circumstance where a visitor’s browser runs arbitrary JavaScript code in the context of the eLabFTW application. This can be triggered by the visitor viewing a list of experiments. Viewing this allows the malicious script to act on behalf of the visitor in any way, including the creation of API keys for persistence, or other options normally available to the user. If the user viewing the page has the sysadmin role in eLabFTW, the script can act as a sysadmin (including system configuration and extensive user management roles). Users are advised to upgrade to at least version 5.0.0. There are no known workarounds for this vulnerability.

Affected configurations

Nvd
Vulners
Vulnrichment
Node
elabftwelabftwRange<5.0.0
VendorProductVersionCPE
elabftwelabftw*cpe:2.3:a:elabftw:elabftw:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "elabftw",
    "product": "elabftw",
    "versions": [
      {
        "version": "< 5.0.0",
        "status": "affected"
      }
    ]
  }
]

CVSS3

8.9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L

AI Score

8.6

Confidence

High

EPSS

0

Percentile

14.7%

Related for CVE-2024-28100