â Back to CVEs
CVE-2024-22418
MEDIUM6.5
Description
Group-Office is an enterprise CRM and groupware tool. Affected versions are subject to a vulnerability which is present in the file upload mechanism of Group Office. It allows an attacker to execute arbitrary JavaScript code by embedding it within a file's name. For instance, using a filename such as â><img src=x onerror=prompt('XSS')>.jpgâ triggers the vulnerability. When this file is uploaded, the JavaScript code within the filename is executed. This issue has been addressed in version 6.8.29. All users are advised to upgrade. There are no known workarounds for this vulnerability.
CVE Details
CVSS v3.1 Score6.5
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredLOW
User InteractionREQUIRED
Published1/18/2024
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
group-office:group_office
Weaknesses (CWE)
CWE-79
References
https://github.com/Intermesh/groupoffice/commit/2a52a5d42d080db6738d70eba30294bcd94ebd09(security-advisories@github.com)
https://github.com/Intermesh/groupoffice/security/advisories/GHSA-p7w9-h6c3-wqpp(security-advisories@github.com)
https://github.com/Intermesh/groupoffice/commit/2a52a5d42d080db6738d70eba30294bcd94ebd09(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/Intermesh/groupoffice/security/advisories/GHSA-p7w9-h6c3-wqpp(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.