Lucene search

K
cveVulDBCVE-2024-9031
HistorySep 20, 2024 - 12:15 p.m.

CVE-2024-9031

2024-09-2012:15:06
CWE-79
VulDB
web.nvd.nist.gov
22
20
vulnerability
codecanyon crmgo saas
remote
cross site scripting
disclosed exploit
file processing
manipulation issue

CVSS2

4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:S/C:N/I:P/A:N

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

CVSS4

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/SC:N/VI:L/SI:N/VA:N/SA:N

AI Score

3.8

Confidence

High

EPSS

0.001

Percentile

30.7%

A vulnerability, which was classified as problematic, has been found in CodeCanyon CRMGo SaaS up to 7.2. This issue affects some unknown processing of the file /project/task/{task_id}/show. The manipulation of the argument comment leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

Affected configurations

Nvd
Vulners
Vulnrichment
Node
workdocrmgo_saasRange<7.2
VendorProductVersionCPE
workdocrmgo_saas*cpe:2.3:a:workdo:crmgo_saas:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "CodeCanyon",
    "product": "CRMGo SaaS",
    "versions": [
      {
        "version": "7.0",
        "status": "affected"
      },
      {
        "version": "7.1",
        "status": "affected"
      },
      {
        "version": "7.2",
        "status": "affected"
      }
    ]
  }
]

Social References

More

CVSS2

4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:S/C:N/I:P/A:N

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

CVSS4

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/SC:N/VI:L/SI:N/VA:N/SA:N

AI Score

3.8

Confidence

High

EPSS

0.001

Percentile

30.7%

Related for CVE-2024-9031