CVE-2024-10289

CVE-2024-10289

Título es
CVE-2024-10289

Mié, 23/10/2024 – 12:15

Tipo
CWE-79

Gravedad 2.0 Txt
Pendiente de análisis

Título en

CVE-2024-10289

Descripción es
Vulnerabilidad de Cross Site Scripting (XSS) que afecta a LocalServer 1.0.9 y que podría permitir a un usuario remoto enviar una consulta especialmente manipulada a un usuario autenticado y robar sus detalles de sesión a través de /mlss/ManageSubscription, parámetro MSubListName.

Descripción en
Cross-Site Scripting (XSS) vulnerability affecting LocalServer 1.0.9 that could allow a remote user to send a specially crafted query to an authenticated user and steal their session details through /mlss/ManageSubscription, parameter MSubListName.

23/10/2024
23/10/2024
Vector CVSS:3.1
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Gravedad 3.1 (CVSS 3.1 Base Score)
6.10

Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
MEDIUM

Referencias
  • https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-xss-vulnerabilities-localserver

  • Enviar en el boletín
    Off

    CVE-2024-10288

    CVE-2024-10288

    Título es
    CVE-2024-10288

    Mié, 23/10/2024 – 12:15

    Tipo
    CWE-79

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2024-10288

    Descripción es
    Vulnerabilidad de Cross Site Scripting (XSS) que afecta a LocalServer 1.0.9 y que podría permitir a un usuario remoto enviar una consulta especialmente manipulada a un usuario autenticado y robar sus detalles de sesión a través de /mlss/SubscribeToList, parámetro ListName.

    Descripción en
    Cross-Site Scripting (XSS) vulnerability affecting LocalServer 1.0.9 that could allow a remote user to send a specially crafted query to an authenticated user and steal their session details through /mlss/SubscribeToList, parameter ListName.

    23/10/2024
    23/10/2024
    Vector CVSS:3.1
    CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

    Gravedad 3.1 (CVSS 3.1 Base Score)
    6.10

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    MEDIUM

    Referencias
  • https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-xss-vulnerabilities-localserver

  • Enviar en el boletín
    Off

    CVE-2024-10287

    CVE-2024-10287

    Título es
    CVE-2024-10287

    Mié, 23/10/2024 – 12:15

    Tipo
    CWE-79

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2024-10287

    Descripción es
    Vulnerabilidad de Cross Site Scripting (XSS) que afecta a LocalServer 1.0.9 y que podría permitir a un usuario remoto enviar una consulta especialmente manipulada a un usuario autenticado y robar sus detalles de sesión a través de /mlss/ForgotPassword, parámetro ListName.

    Descripción en
    Cross-Site Scripting (XSS) vulnerability affecting LocalServer 1.0.9 that could allow a remote user to send a specially crafted query to an authenticated user and steal their session details through /mlss/ForgotPassword, parameter ListName.

    23/10/2024
    23/10/2024
    Vector CVSS:3.1
    CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

    Gravedad 3.1 (CVSS 3.1 Base Score)
    6.10

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    MEDIUM

    Referencias
  • https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-xss-vulnerabilities-localserver

  • Enviar en el boletín
    Off

    CVE-2024-50066

    CVE-2024-50066

    Título es
    CVE-2024-50066

    Mié, 23/10/2024 – 06:15

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2024-50066

    Descripción en
    In the Linux kernel, the following vulnerability has been resolved:

    mm/mremap: fix move_normal_pmd/retract_page_tables race

    In mremap(), move_page_tables() looks at the type of the PMD entry and the
    specified address range to figure out by which method the next chunk of
    page table entries should be moved.

    At that point, the mmap_lock is held in write mode, but no rmap locks are
    held yet. For PMD entries that point to page tables and are fully covered
    by the source address range, move_pgt_entry(NORMAL_PMD, …) is called,
    which first takes rmap locks, then does move_normal_pmd().
    move_normal_pmd() takes the necessary page table locks at source and
    destination, then moves an entire page table from the source to the
    destination.

    The problem is: The rmap locks, which protect against concurrent page
    table removal by retract_page_tables() in the THP code, are only taken
    after the PMD entry has been read and it has been decided how to move it.
    So we can race as follows (with two processes that have mappings of the
    same tmpfs file that is stored on a tmpfs mount with huge=advise); note
    that process A accesses page tables through the MM while process B does it
    through the file rmap:

    process A process B
    ========= =========
    mremap
    mremap_to
    move_vma
    move_page_tables
    get_old_pmd
    alloc_new_pmd
    *** PREEMPT ***
    madvise(MADV_COLLAPSE)
    do_madvise
    madvise_walk_vmas
    madvise_vma_behavior
    madvise_collapse
    hpage_collapse_scan_file
    collapse_file
    retract_page_tables
    i_mmap_lock_read(mapping)
    pmdp_collapse_flush
    i_mmap_unlock_read(mapping)
    move_pgt_entry(NORMAL_PMD, …)
    take_rmap_locks
    move_normal_pmd
    drop_rmap_locks

    When this happens, move_normal_pmd() can end up creating bogus PMD entries
    in the line `pmd_populate(mm, new_pmd, pmd_pgtable(pmd))`. The effect
    depends on arch-specific and machine-specific details; on x86, you can end
    up with physical page 0 mapped as a page table, which is likely
    exploitable for user->kernel privilege escalation.

    Fix the race by letting process B recheck that the PMD still points to a
    page table after the rmap locks have been taken. Otherwise, we bail and
    let the caller fall back to the PTE-level copying path, which will then
    bail immediately at the pmd_none() check.

    Bug reachability: Reaching this bug requires that you can create
    shmem/file THP mappings – anonymous THP uses different code that doesn't
    zap stuff under rmap locks. File THP is gated on an experimental config
    flag (CONFIG_READ_ONLY_THP_FOR_FS), so on normal distro kernels you need
    shmem THP to hit this bug. As far as I know, getting shmem THP normally
    requires that you can mount your own tmpfs with the right mount flags,
    which would require creating your own user+mount namespace; though I don't
    know if some distros maybe enable shmem THP by default or something like
    that.

    Bug impact: This issue can likely be used for user->kernel privilege
    escalation when it is reachable.

    23/10/2024
    23/10/2024
    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    Pendiente de análisis

    Enviar en el boletín
    Off

    CVE-2024-9829

    CVE-2024-9829

    Título es
    CVE-2024-9829

    Mié, 23/10/2024 – 06:15

    Tipo
    CWE-862

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2024-9829

    Descripción en
    The Download Plugin plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability checks on the 'dpwap_handle_download_user' and 'dpwap_handle_download_comment' functions in all versions up to, and including, 2.2.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to download any comment, and download metadata for any user including user PII and sensitive information including username, email, hashed passwords and application passwords, session token information and more depending on set up and additional plugins installed.

    23/10/2024
    23/10/2024
    Vector CVSS:3.1
    CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

    Gravedad 3.1 (CVSS 3.1 Base Score)
    6.50

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    MEDIUM

    Enviar en el boletín
    Off

    CVE-2024-9583

    CVE-2024-9583

    Título es
    CVE-2024-9583

    Mié, 23/10/2024 – 07:15

    Tipo
    CWE-862

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2024-9583

    Descripción en
    The RSS Aggregator – RSS Import, News Feeds, Feed to Post, and Autoblogging plugin for WordPress is vulnerable to unauthorized use of functionality due to a missing capability check on the wprss_ajax_send_premium_support function in all versions up to, and including, 4.23.12. This makes it possible for authenticated attackers, with Subscriber-level access and above, to send premium support requests with an attacker-controlled subject line and email address to support allowing them to impersonate the site owner. License information may also be leaked.

    23/10/2024
    23/10/2024
    Vector CVSS:3.1
    CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

    Gravedad 3.1 (CVSS 3.1 Base Score)
    4.30

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    MEDIUM

    Enviar en el boletín
    Off

    CVE-2024-9947

    CVE-2024-9947

    Título es
    CVE-2024-9947

    Mié, 23/10/2024 – 07:15

    Tipo
    CWE-287

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2024-9947

    Descripción en
    The ProfilePress Pro plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 4.11.1. This is due to insufficient verification on the user being returned by the social login token. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email and the user does not have an already-existing account for the service returning the token.

    23/10/2024
    23/10/2024
    Vector CVSS:3.1
    CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

    Gravedad 3.1 (CVSS 3.1 Base Score)
    8.10

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    HIGH

    Enviar en el boletín
    Off

    CVE-2024-10045

    CVE-2024-10045

    Título es
    CVE-2024-10045

    Mié, 23/10/2024 – 08:15

    Tipo
    CWE-352

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2024-10045

    Descripción en
    The Transients Manager plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.0.6. This is due to missing or incorrect nonce validation on the process_actions function. This makes it possible for unauthenticated attackers to delete transients via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

    23/10/2024
    23/10/2024
    Vector CVSS:3.1
    CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

    Gravedad 3.1 (CVSS 3.1 Base Score)
    4.30

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    MEDIUM

    Enviar en el boletín
    Off

    CVE-2024-9530

    CVE-2024-9530

    Título es
    CVE-2024-9530

    Mié, 23/10/2024 – 08:15

    Tipo
    CWE-200

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2024-9530

    Descripción en
    The Qi Addons For Elementor plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.8.0 via private templates. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract sensitive data including the contents of templates that are private.

    23/10/2024
    23/10/2024
    Vector CVSS:3.1
    CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

    Gravedad 3.1 (CVSS 3.1 Base Score)
    4.30

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    MEDIUM

    Enviar en el boletín
    Off

    CVE-2024-43924

    CVE-2024-43924

    Título es
    CVE-2024-43924

    Mié, 23/10/2024 – 08:15

    Tipo
    CWE-862

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2024-43924

    Descripción en
    Missing Authorization vulnerability in dFactory Responsive Lightbox allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Responsive Lightbox: from n/a through 2.4.7.

    23/10/2024
    23/10/2024
    Vector CVSS:3.1
    CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

    Gravedad 3.1 (CVSS 3.1 Base Score)
    5.30

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    MEDIUM

    Enviar en el boletín
    Off