Lucene search

K
cvelistGitHub_MCVELIST:CVE-2024-28251
HistoryMar 13, 2024 - 11:21 p.m.

CVE-2024-28251 Cross-site websocket hijacking in Querybook

2024-03-1323:21:28
CWE-345
GitHub_M
raw.githubusercontent.com
4
cve-2024-28251
cross-site websocket hijacking
querybook
websocket server
cors setting
datadocs
vulnerability
upgrade

6.8 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

8.4%

Querybook is a Big Data Querying UI, combining collocated table metadata and a simple notebook interface. Querybook’s datadocs functionality works by using a Websocket Server. The client talks to this WSS whenever updating/deleting/reading any cells as well as for watching the live status of query executions. Currently the CORS setting allows all origins, which could result in cross-site websocket hijacking and allow attackers to read/edit/remove datadocs of the user. This issue has been addressed in version 3.32.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.

6.8 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

8.4%

Related for CVELIST:CVE-2024-28251