All the vulnerabilites related to ampache - ampache
cve-2024-51490
Vulnerability from cvelistv5
Published
2024-11-11 19:35
Modified
2024-11-12 01:44
Severity ?
EPSS score ?
Summary
Stored Cross-Site Scripting in Ampache
References
▼ | URL | Tags |
---|---|---|
https://github.com/ampache/ampache/security/advisories/GHSA-x979-f6px-7j2w | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-51490", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-12T01:43:59.501057Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-12T01:44:17.324Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "ampache", "vendor": "ampache", "versions": [ { "status": "affected", "version": "\u003c 7.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Ampache is a web based audio/video streaming application and file manager. This vulnerability exists in the interface section of the Ampache menu, where users can change \"Custom URL - Logo\". This section is not properly sanitized, allowing for the input of strings that can execute JavaScript. This issue has been addressed in version 7.0.1 and all users are advised to upgrade. There are no known workarounds for this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-11T19:35:21.582Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/ampache/ampache/security/advisories/GHSA-x979-f6px-7j2w", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/ampache/ampache/security/advisories/GHSA-x979-f6px-7j2w" } ], "source": { "advisory": "GHSA-x979-f6px-7j2w", "discovery": "UNKNOWN" }, "title": "Stored Cross-Site Scripting in Ampache" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-51490", "datePublished": "2024-11-11T19:35:21.582Z", "dateReserved": "2024-10-28T14:20:59.336Z", "dateUpdated": "2024-11-12T01:44:17.324Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-4665
Vulnerability from cvelistv5
Published
2022-12-23 00:00
Modified
2024-08-03 01:48
Severity ?
EPSS score ?
Summary
Unrestricted Upload of File with Dangerous Type in ampache/ampache
References
Impacted products
▼ | Vendor | Product |
---|---|---|
ampache | ampache/ampache |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:48:39.575Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/5e7f3ecc-3b08-4e0e-8bf8-ae7ae229941f" }, { "tags": [ "x_transferred" ], "url": "https://github.com/ampache/ampache/commit/8293fa86e5f50a168b7f5c892ffbd6aa555134bd" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ampache/ampache", "vendor": "ampache", "versions": [ { "lessThan": "5.5.6", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Unrestricted Upload of File with Dangerous Type in GitHub repository ampache/ampache prior to 5.5.6." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-434", "description": "CWE-434 Unrestricted Upload of File with Dangerous Type", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-23T00:00:00", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/5e7f3ecc-3b08-4e0e-8bf8-ae7ae229941f" }, { "url": "https://github.com/ampache/ampache/commit/8293fa86e5f50a168b7f5c892ffbd6aa555134bd" } ], "source": { "advisory": "5e7f3ecc-3b08-4e0e-8bf8-ae7ae229941f", "discovery": "EXTERNAL" }, "title": "Unrestricted Upload of File with Dangerous Type in ampache/ampache" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-4665", "datePublished": "2022-12-23T00:00:00", "dateReserved": "2022-12-23T00:00:00", "dateUpdated": "2024-08-03T01:48:39.575Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41665
Vulnerability from cvelistv5
Published
2024-07-23 17:14
Modified
2024-08-02 04:46
Severity ?
EPSS score ?
Summary
Ampache Stored Cross-site Scripting Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://github.com/ampache/ampache/security/advisories/GHSA-cp44-89r2-fxph | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:ampache:ampache:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ampache", "vendor": "ampache", "versions": [ { "lessThan": "6.6.0", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-41665", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-23T20:06:51.489479Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-23T20:07:21.477Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T04:46:52.459Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/ampache/ampache/security/advisories/GHSA-cp44-89r2-fxph", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/ampache/ampache/security/advisories/GHSA-cp44-89r2-fxph" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ampache", "vendor": "ampache", "versions": [ { "status": "affected", "version": "\u003c 6.6.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Ampache, a web based audio/video streaming application and file manager, has a stored cross-site scripting (XSS) vulnerability in versions prior to 6.6.0. This vulnerability exists in the \"Playlists - Democratic - Configure Democratic Playlist\" feature. An attacker with Content Manager permissions can set the Name field to `\u003csvg onload=alert(8)\u003e`. When any administrator or user accesses the Democratic functionality, they will be affected by this stored XSS vulnerability. The attacker can exploit this vulnerability to obtain the cookies of any user or administrator who accesses the `democratic.php` file. Version 6.6.0 contains a patch for the issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-23T17:14:56.459Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/ampache/ampache/security/advisories/GHSA-cp44-89r2-fxph", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/ampache/ampache/security/advisories/GHSA-cp44-89r2-fxph" } ], "source": { "advisory": "GHSA-cp44-89r2-fxph", "discovery": "UNKNOWN" }, "title": "Ampache Stored Cross-site Scripting Vulnerability" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-41665", "datePublished": "2024-07-23T17:14:56.459Z", "dateReserved": "2024-07-18T15:21:47.484Z", "dateUpdated": "2024-08-02T04:46:52.459Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-21399
Vulnerability from cvelistv5
Published
2021-04-13 17:50
Modified
2024-08-03 18:09
Severity ?
EPSS score ?
Summary
Unauthenticated SubSonic backend access in Ampache
References
▼ | URL | Tags |
---|---|---|
https://github.com/ampache/ampache/security/advisories/GHSA-p9pm-j95j-5mjf | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:09:15.871Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/ampache/ampache/security/advisories/GHSA-p9pm-j95j-5mjf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ampache", "vendor": "ampache", "versions": [ { "status": "affected", "version": "\u003c 4.4.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Ampache is a web based audio/video streaming application and file manager. Versions prior to 4.4.1 allow unauthenticated access to Ampache using the subsonic API. To successfully make the attack you must use a username that is not part of the site to bypass the auth checks. For more details and workaround guidance see the referenced GitHub security advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "{\"CWE-284\":\"Improper Access Control\"}", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-13T17:50:13", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/ampache/ampache/security/advisories/GHSA-p9pm-j95j-5mjf" } ], "source": { "advisory": "GHSA-p9pm-j95j-5mjf", "discovery": "UNKNOWN" }, "title": "Unauthenticated SubSonic backend access in Ampache", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-21399", "STATE": "PUBLIC", "TITLE": "Unauthenticated SubSonic backend access in Ampache" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ampache", "version": { "version_data": [ { "version_value": "\u003c 4.4.1" } ] } } ] }, "vendor_name": "ampache" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Ampache is a web based audio/video streaming application and file manager. Versions prior to 4.4.1 allow unauthenticated access to Ampache using the subsonic API. To successfully make the attack you must use a username that is not part of the site to bypass the auth checks. For more details and workaround guidance see the referenced GitHub security advisory." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "{\"CWE-284\":\"Improper Access Control\"}" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/ampache/ampache/security/advisories/GHSA-p9pm-j95j-5mjf", "refsource": "CONFIRM", "url": "https://github.com/ampache/ampache/security/advisories/GHSA-p9pm-j95j-5mjf" } ] }, "source": { "advisory": "GHSA-p9pm-j95j-5mjf", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-21399", "datePublished": "2021-04-13T17:50:13", "dateReserved": "2020-12-22T00:00:00", "dateUpdated": "2024-08-03T18:09:15.871Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-15153
Vulnerability from cvelistv5
Published
2021-04-30 15:20
Modified
2024-08-04 13:08
Severity ?
EPSS score ?
Summary
Unauthenticated SQL injection in Ampache
References
▼ | URL | Tags |
---|---|---|
https://github.com/ampache/ampache/security/advisories/GHSA-phr3-mpx5-7826 | x_refsource_CONFIRM | |
https://github.com/ampache/ampache/commit/e92cb6154c32c513b9c07e5fdbf5ac7de81ef5ed | x_refsource_MISC | |
https://github.com/ampache/ampache/releases/tag/4.2.2 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T13:08:22.314Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/ampache/ampache/security/advisories/GHSA-phr3-mpx5-7826" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/ampache/ampache/commit/e92cb6154c32c513b9c07e5fdbf5ac7de81ef5ed" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/ampache/ampache/releases/tag/4.2.2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ampache", "vendor": "ampache", "versions": [ { "status": "affected", "version": "\u003c 4.2.2" } ] } ], "descriptions": [ { "lang": "en", "value": "Ampache before version 4.2.2 allows unauthenticated users to perform SQL injection. Refer to the referenced GitHub Security Advisory for details and a workaround. This is fixed in version 4.2.2 and the development branch." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "{\"CWE-89\":\"Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)\"}", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-30T15:20:15", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/ampache/ampache/security/advisories/GHSA-phr3-mpx5-7826" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/ampache/ampache/commit/e92cb6154c32c513b9c07e5fdbf5ac7de81ef5ed" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/ampache/ampache/releases/tag/4.2.2" } ], "source": { "advisory": "GHSA-phr3-mpx5-7826", "discovery": "UNKNOWN" }, "title": "Unauthenticated SQL injection in Ampache", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2020-15153", "STATE": "PUBLIC", "TITLE": "Unauthenticated SQL injection in Ampache" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ampache", "version": { "version_data": [ { "version_value": "\u003c 4.2.2" } ] } } ] }, "vendor_name": "ampache" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Ampache before version 4.2.2 allows unauthenticated users to perform SQL injection. Refer to the referenced GitHub Security Advisory for details and a workaround. This is fixed in version 4.2.2 and the development branch." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "{\"CWE-89\":\"Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)\"}" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/ampache/ampache/security/advisories/GHSA-phr3-mpx5-7826", "refsource": "CONFIRM", "url": "https://github.com/ampache/ampache/security/advisories/GHSA-phr3-mpx5-7826" }, { "name": "https://github.com/ampache/ampache/commit/e92cb6154c32c513b9c07e5fdbf5ac7de81ef5ed", "refsource": "MISC", "url": "https://github.com/ampache/ampache/commit/e92cb6154c32c513b9c07e5fdbf5ac7de81ef5ed" }, { "name": "https://github.com/ampache/ampache/releases/tag/4.2.2", "refsource": "MISC", "url": "https://github.com/ampache/ampache/releases/tag/4.2.2" } ] }, "source": { "advisory": "GHSA-phr3-mpx5-7826", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-15153", "datePublished": "2021-04-30T15:20:16", "dateReserved": "2020-06-25T00:00:00", "dateUpdated": "2024-08-04T13:08:22.314Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-51487
Vulnerability from cvelistv5
Published
2024-11-11 19:43
Modified
2024-11-12 01:43
Severity ?
EPSS score ?
Summary
Insufficient Validation in Catalog (Activation/Deactivation) in Ampache
References
▼ | URL | Tags |
---|---|---|
https://github.com/ampache/ampache/security/advisories/GHSA-5rmx-fjmc-mg6x | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-51487", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-12T01:43:30.363606Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-12T01:43:48.257Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "ampache", "vendor": "ampache", "versions": [ { "status": "affected", "version": "\u003c 7.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Ampache is a web based audio/video streaming application and file manager. The current implementation of token parsing fails to properly validate CSRF tokens when activating or deactivating catalog. This vulnerability allows an attacker to exploit CSRF attacks, potentially enabling them to change website features that should only be managed by administrators through malicious requests. This issue has been addressed in version 7.0.1 and all users are advised to upgrade. There are no known workarounds for this vulnerability." } ], "metrics": [ { "cvssV4_0": { "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 5.3, "baseSeverity": "MEDIUM", "privilegesRequired": "LOW", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "CWE-352: Cross-Site Request Forgery (CSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-11T19:43:07.322Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/ampache/ampache/security/advisories/GHSA-5rmx-fjmc-mg6x", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/ampache/ampache/security/advisories/GHSA-5rmx-fjmc-mg6x" } ], "source": { "advisory": "GHSA-5rmx-fjmc-mg6x", "discovery": "UNKNOWN" }, "title": "Insufficient Validation in Catalog (Activation/Deactivation) in Ampache" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-51487", "datePublished": "2024-11-11T19:43:07.322Z", "dateReserved": "2024-10-28T14:20:59.336Z", "dateUpdated": "2024-11-12T01:43:48.257Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-28852
Vulnerability from cvelistv5
Published
2024-03-27 13:18
Modified
2024-08-13 14:11
Severity ?
EPSS score ?
Summary
Ampache has multiple reflective XSS vulnerabilities
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T00:56:58.143Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/ampache/ampache/security/advisories/GHSA-g7hx-hm68-f639", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/ampache/ampache/security/advisories/GHSA-g7hx-hm68-f639" }, { "name": "https://github.com/ampache/ampache/blob/bcaa9a4624acf8c8cc4c135be77b846731fb1ba2/src/Repository/Model/Search.php#L1732-L1740", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/ampache/ampache/blob/bcaa9a4624acf8c8cc4c135be77b846731fb1ba2/src/Repository/Model/Search.php#L1732-L1740" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:ampache:ampache:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ampache", "vendor": "ampache", "versions": [ { "lessThan": "6.3.1", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-28852", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-03-27T19:23:59.537407Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-13T14:11:34.057Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "ampache", "vendor": "ampache", "versions": [ { "status": "affected", "version": "\u003c 6.3.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Ampache is a web based audio/video streaming application and file manager. Ampache has multiple reflective XSS vulnerabilities,this means that all forms in the Ampache that use `rule` as a variable are not secure. For example, when querying a song, when querying a podcast, we need to use `$rule` variable. This vulnerability is fixed in 6.3.1\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-03-27T13:18:10.464Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/ampache/ampache/security/advisories/GHSA-g7hx-hm68-f639", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/ampache/ampache/security/advisories/GHSA-g7hx-hm68-f639" }, { "name": "https://github.com/ampache/ampache/blob/bcaa9a4624acf8c8cc4c135be77b846731fb1ba2/src/Repository/Model/Search.php#L1732-L1740", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/ampache/ampache/blob/bcaa9a4624acf8c8cc4c135be77b846731fb1ba2/src/Repository/Model/Search.php#L1732-L1740" } ], "source": { "advisory": "GHSA-g7hx-hm68-f639", "discovery": "UNKNOWN" }, "title": "Ampache has multiple reflective XSS vulnerabilities" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-28852", "datePublished": "2024-03-27T13:18:10.464Z", "dateReserved": "2024-03-11T22:45:07.685Z", "dateUpdated": "2024-08-13T14:11:34.057Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-51484
Vulnerability from cvelistv5
Published
2024-11-11 19:46
Modified
2024-11-12 01:42
Severity ?
EPSS score ?
Summary
Insufficient Validation in Controllers (Activation/Deactivation) in Ampache
References
▼ | URL | Tags |
---|---|---|
https://github.com/ampache/ampache/security/advisories/GHSA-h6vj-6rvc-3x29 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-51484", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-12T01:42:31.026922Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-12T01:42:49.921Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "ampache", "vendor": "ampache", "versions": [ { "status": "affected", "version": "\u003c 7.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Ampache is a web based audio/video streaming application and file manager. The current implementation of token parsing fails to properly validate CSRF tokens when activating or deactivating controllers. This vulnerability allows an attacker to exploit CSRF attacks, potentially enabling them to change website features that should only be managed by administrators through malicious requests. This issue has been addressed in version 7.0.1 and all users are advised to upgrade. There are no known workarounds for this vulnerability." } ], "metrics": [ { "cvssV4_0": { "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 5.3, "baseSeverity": "MEDIUM", "privilegesRequired": "LOW", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "CWE-352: Cross-Site Request Forgery (CSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-11T19:46:07.809Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/ampache/ampache/security/advisories/GHSA-h6vj-6rvc-3x29", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/ampache/ampache/security/advisories/GHSA-h6vj-6rvc-3x29" } ], "source": { "advisory": "GHSA-h6vj-6rvc-3x29", "discovery": "UNKNOWN" }, "title": "Insufficient Validation in Controllers (Activation/Deactivation) in Ampache" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-51484", "datePublished": "2024-11-11T19:46:07.809Z", "dateReserved": "2024-10-28T14:20:59.336Z", "dateUpdated": "2024-11-12T01:42:49.921Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-51488
Vulnerability from cvelistv5
Published
2024-11-11 19:42
Modified
2024-11-12 01:44
Severity ?
EPSS score ?
Summary
Insufficient Validation in Delete Message in Ampache
References
▼ | URL | Tags |
---|---|---|
https://github.com/ampache/ampache/security/advisories/GHSA-46m4-5pxj-66f2 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-51488", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-12T01:43:49.822369Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-12T01:44:07.126Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "ampache", "vendor": "ampache", "versions": [ { "status": "affected", "version": "\u003c 7.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Ampache is a web based audio/video streaming application and file manager. The current implementation of token parsing does not adequately validate CSRF tokens when users delete messages. This vulnerability could be exploited to forge CSRF attacks, allowing an attacker to delete messages to any user, including administrators, if they interact with a malicious request. This issue has been addressed in version 7.0.1 and all users are advised to upgrade. There are no known workarounds for this vulnerability." } ], "metrics": [ { "cvssV4_0": { "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 5.3, "baseSeverity": "MEDIUM", "privilegesRequired": "LOW", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "CWE-352: Cross-Site Request Forgery (CSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-11T19:42:29.878Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/ampache/ampache/security/advisories/GHSA-46m4-5pxj-66f2", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/ampache/ampache/security/advisories/GHSA-46m4-5pxj-66f2" } ], "source": { "advisory": "GHSA-46m4-5pxj-66f2", "discovery": "UNKNOWN" }, "title": "Insufficient Validation in Delete Message in Ampache" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-51488", "datePublished": "2024-11-11T19:42:29.878Z", "dateReserved": "2024-10-28T14:20:59.336Z", "dateUpdated": "2024-11-12T01:44:07.126Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-3929
Vulnerability from cvelistv5
Published
2008-09-04 18:00
Modified
2024-08-07 10:00
Severity ?
EPSS score ?
Summary
gather-messages.sh in Ampache 3.4.1 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/filelist temporary file.
References
▼ | URL | Tags |
---|---|---|
http://security.gentoo.org/glsa/glsa-200812-22.xml | vendor-advisory, x_refsource_GENTOO | |
http://www.openwall.com/lists/oss-security/2008/10/30/2 | mailing-list, x_refsource_MLIST | |
http://dev.gentoo.org/~rbu/security/debiantemp/ampache | x_refsource_CONFIRM | |
http://secunia.com/advisories/33316 | third-party-advisory, x_refsource_SECUNIA | |
https://bugs.gentoo.org/show_bug.cgi?id=235770 | x_refsource_CONFIRM | |
http://secunia.com/advisories/31657 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/30875 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/44739 | vdb-entry, x_refsource_XF | |
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496369 | x_refsource_CONFIRM | |
http://freshmeat.net/projects/ampache/releases/283935 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T10:00:41.715Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-200812-22", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200812-22.xml" }, { "name": "[oss-security] 20081030 CVE requests: tempfile issues for aview, mgetty, openoffice, crossfire", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2008/10/30/2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.gentoo.org/~rbu/security/debiantemp/ampache" }, { "name": "33316", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/33316" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.gentoo.org/show_bug.cgi?id=235770" }, { "name": "31657", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31657" }, { "name": "30875", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/30875" }, { "name": "ampache-gathermessages-symlink(44739)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44739" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496369" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://freshmeat.net/projects/ampache/releases/283935" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-08-24T00:00:00", "descriptions": [ { "lang": "en", "value": "gather-messages.sh in Ampache 3.4.1 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/filelist temporary file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-07T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "GLSA-200812-22", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200812-22.xml" }, { "name": "[oss-security] 20081030 CVE requests: tempfile issues for aview, mgetty, openoffice, crossfire", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2008/10/30/2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.gentoo.org/~rbu/security/debiantemp/ampache" }, { "name": "33316", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/33316" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.gentoo.org/show_bug.cgi?id=235770" }, { "name": "31657", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31657" }, { "name": "30875", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/30875" }, { "name": "ampache-gathermessages-symlink(44739)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44739" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496369" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://freshmeat.net/projects/ampache/releases/283935" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-3929", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "gather-messages.sh in Ampache 3.4.1 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/filelist temporary file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-200812-22", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200812-22.xml" }, { "name": "[oss-security] 20081030 CVE requests: tempfile issues for aview, mgetty, openoffice, crossfire", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2008/10/30/2" }, { "name": "http://dev.gentoo.org/~rbu/security/debiantemp/ampache", "refsource": "CONFIRM", "url": "http://dev.gentoo.org/~rbu/security/debiantemp/ampache" }, { "name": "33316", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/33316" }, { "name": "https://bugs.gentoo.org/show_bug.cgi?id=235770", "refsource": "CONFIRM", "url": "https://bugs.gentoo.org/show_bug.cgi?id=235770" }, { "name": "31657", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31657" }, { "name": "30875", "refsource": "BID", "url": "http://www.securityfocus.com/bid/30875" }, { "name": "ampache-gathermessages-symlink(44739)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44739" }, { "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496369", "refsource": "CONFIRM", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496369" }, { "name": "http://freshmeat.net/projects/ampache/releases/283935", "refsource": "CONFIRM", "url": "http://freshmeat.net/projects/ampache/releases/283935" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-3929", "datePublished": "2008-09-04T18:00:00", "dateReserved": "2008-09-04T00:00:00", "dateUpdated": "2024-08-07T10:00:41.715Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-12385
Vulnerability from cvelistv5
Published
2019-08-22 18:19
Modified
2024-08-04 23:17
Severity ?
EPSS score ?
Summary
An issue was discovered in Ampache through 3.9.1. The search engine is affected by a SQL Injection, so any user able to perform lib/class/search.class.php searches (even guest users) can dump any data contained in the database (sessions, hashed passwords, etc.). This may lead to a full compromise of admin accounts, when combined with the weak password generator algorithm used in the lostpassword functionality.
References
▼ | URL | Tags |
---|---|---|
https://www.tarlogic.com/en/blog/vulnerabilities-in-ampache/ | x_refsource_MISC | |
https://lists.debian.org/debian-lts-announce/2019/11/msg00008.html | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T23:17:39.932Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.tarlogic.com/en/blog/vulnerabilities-in-ampache/" }, { "name": "[debian-lts-announce] 20191111 [SECURITY] [DLA 1988-1] ampache security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2019/11/msg00008.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2019-08-21T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue was discovered in Ampache through 3.9.1. The search engine is affected by a SQL Injection, so any user able to perform lib/class/search.class.php searches (even guest users) can dump any data contained in the database (sessions, hashed passwords, etc.). This may lead to a full compromise of admin accounts, when combined with the weak password generator algorithm used in the lostpassword functionality." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-11-11T15:06:37", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.tarlogic.com/en/blog/vulnerabilities-in-ampache/" }, { "name": "[debian-lts-announce] 20191111 [SECURITY] [DLA 1988-1] ampache security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2019/11/msg00008.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-12385", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Ampache through 3.9.1. The search engine is affected by a SQL Injection, so any user able to perform lib/class/search.class.php searches (even guest users) can dump any data contained in the database (sessions, hashed passwords, etc.). This may lead to a full compromise of admin accounts, when combined with the weak password generator algorithm used in the lostpassword functionality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.tarlogic.com/en/blog/vulnerabilities-in-ampache/", "refsource": "MISC", "url": "https://www.tarlogic.com/en/blog/vulnerabilities-in-ampache/" }, { "name": "[debian-lts-announce] 20191111 [SECURITY] [DLA 1988-1] ampache security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2019/11/msg00008.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-12385", "datePublished": "2019-08-22T18:19:41", "dateReserved": "2019-05-28T00:00:00", "dateUpdated": "2024-08-04T23:17:39.932Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-47184
Vulnerability from cvelistv5
Published
2024-09-27 14:05
Modified
2024-09-27 16:20
Severity ?
EPSS score ?
Summary
Ampache vulnerable to Stored XSS via Democratic Playlist Name
References
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:ampache:ampache:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ampache", "vendor": "ampache", "versions": [ { "lessThan": "6.6.0", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-47184", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-27T15:01:07.163760Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-27T16:20:59.445Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "ampache", "vendor": "ampache", "versions": [ { "status": "affected", "version": "\u003c 6.6.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Ampache is a web based audio/video streaming application and file manager. Prior to version 6.6.0, the Democratic Playlist Name is vulnerable to a stored cross-site scripting. Version 6.6.0 fixes this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-27T14:05:01.794Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/ampache/ampache/security/advisories/GHSA-f99r-gv34-v46f", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/ampache/ampache/security/advisories/GHSA-f99r-gv34-v46f" }, { "name": "https://github.com/ampache/ampache/commit/7e64d140dafcbe0d61f1a07e94486f6ed67932d6", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/ampache/ampache/commit/7e64d140dafcbe0d61f1a07e94486f6ed67932d6" }, { "name": "https://github.com/ampache/ampache/blob/ff332c9810e493fd51b258f5e53119fad86c23bf/public/templates/show_democratic.inc.php#L36", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/ampache/ampache/blob/ff332c9810e493fd51b258f5e53119fad86c23bf/public/templates/show_democratic.inc.php#L36" } ], "source": { "advisory": "GHSA-f99r-gv34-v46f", "discovery": "UNKNOWN" }, "title": "Ampache vulnerable to Stored XSS via Democratic Playlist Name" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-47184", "datePublished": "2024-09-27T14:05:01.794Z", "dateReserved": "2024-09-19T22:32:11.963Z", "dateUpdated": "2024-09-27T16:20:59.445Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-32644
Vulnerability from cvelistv5
Published
2021-06-22 17:45
Modified
2024-08-03 23:25
Severity ?
EPSS score ?
Summary
Cross-site Scripting in Random.php
References
▼ | URL | Tags |
---|---|---|
https://github.com/ampache/ampache/security/advisories/GHSA-vqpj-xgw2-r54q | x_refsource_CONFIRM | |
https://github.com/ampache/ampache/commit/c9453841e1b517a1660c3da1efd1fe5d623c93a5 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:25:31.026Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/ampache/ampache/security/advisories/GHSA-vqpj-xgw2-r54q" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/ampache/ampache/commit/c9453841e1b517a1660c3da1efd1fe5d623c93a5" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ampache", "vendor": "ampache", "versions": [ { "status": "affected", "version": "\u003e= 4.0.0, \u003c 4.4.3" } ] } ], "descriptions": [ { "lang": "en", "value": "Ampache is an open source web based audio/video streaming application and file manager. Due to a lack of input filtering versions 4.x.y are vulnerable to code injection in random.php. The attack requires user authentication to access the random.php page unless the site is running in demo mode. This issue has been resolved in 4.4.3." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-22T17:45:11", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/ampache/ampache/security/advisories/GHSA-vqpj-xgw2-r54q" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/ampache/ampache/commit/c9453841e1b517a1660c3da1efd1fe5d623c93a5" } ], "source": { "advisory": "GHSA-vqpj-xgw2-r54q", "discovery": "UNKNOWN" }, "title": "Cross-site Scripting in Random.php", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-32644", "STATE": "PUBLIC", "TITLE": "Cross-site Scripting in Random.php" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ampache", "version": { "version_data": [ { "version_value": "\u003e= 4.0.0, \u003c 4.4.3" } ] } } ] }, "vendor_name": "ampache" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Ampache is an open source web based audio/video streaming application and file manager. Due to a lack of input filtering versions 4.x.y are vulnerable to code injection in random.php. The attack requires user authentication to access the random.php page unless the site is running in demo mode. This issue has been resolved in 4.4.3." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/ampache/ampache/security/advisories/GHSA-vqpj-xgw2-r54q", "refsource": "CONFIRM", "url": "https://github.com/ampache/ampache/security/advisories/GHSA-vqpj-xgw2-r54q" }, { "name": "https://github.com/ampache/ampache/commit/c9453841e1b517a1660c3da1efd1fe5d623c93a5", "refsource": "MISC", "url": "https://github.com/ampache/ampache/commit/c9453841e1b517a1660c3da1efd1fe5d623c93a5" } ] }, "source": { "advisory": "GHSA-vqpj-xgw2-r54q", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-32644", "datePublished": "2021-06-22T17:45:11", "dateReserved": "2021-05-12T00:00:00", "dateUpdated": "2024-08-03T23:25:31.026Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-4437
Vulnerability from cvelistv5
Published
2007-08-20 22:00
Modified
2024-08-07 14:53
Severity ?
EPSS score ?
Summary
SQL injection vulnerability in albums.php in Ampache before 3.3.3.5 allows remote attackers to execute arbitrary SQL commands via the match parameter. NOTE: some details are obtained from third party information.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/25362 | vdb-entry, x_refsource_BID | |
http://bugs.gentoo.org/show_bug.cgi?id=189607 | x_refsource_CONFIRM | |
http://osvdb.org/38276 | vdb-entry, x_refsource_OSVDB | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/36121 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/27253 | third-party-advisory, x_refsource_SECUNIA | |
http://www.ampache.org/announce/3_3_3_5.php | x_refsource_CONFIRM | |
http://security.gentoo.org/glsa/glsa-200710-13.xml | vendor-advisory, x_refsource_GENTOO | |
http://secunia.com/advisories/26542 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T14:53:55.993Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "25362", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/25362" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.gentoo.org/show_bug.cgi?id=189607" }, { "name": "38276", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/38276" }, { "name": "ampache-match-sql-injection(36121)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36121" }, { "name": "27253", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27253" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ampache.org/announce/3_3_3_5.php" }, { "name": "GLSA-200710-13", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200710-13.xml" }, { "name": "26542", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26542" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-08-20T00:00:00", "descriptions": [ { "lang": "en", "value": "SQL injection vulnerability in albums.php in Ampache before 3.3.3.5 allows remote attackers to execute arbitrary SQL commands via the match parameter. NOTE: some details are obtained from third party information." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "25362", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/25362" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.gentoo.org/show_bug.cgi?id=189607" }, { "name": "38276", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/38276" }, { "name": "ampache-match-sql-injection(36121)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36121" }, { "name": "27253", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27253" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ampache.org/announce/3_3_3_5.php" }, { "name": "GLSA-200710-13", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200710-13.xml" }, { "name": "26542", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26542" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-4437", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SQL injection vulnerability in albums.php in Ampache before 3.3.3.5 allows remote attackers to execute arbitrary SQL commands via the match parameter. NOTE: some details are obtained from third party information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "25362", "refsource": "BID", "url": "http://www.securityfocus.com/bid/25362" }, { "name": "http://bugs.gentoo.org/show_bug.cgi?id=189607", "refsource": "CONFIRM", "url": "http://bugs.gentoo.org/show_bug.cgi?id=189607" }, { "name": "38276", "refsource": "OSVDB", "url": "http://osvdb.org/38276" }, { "name": "ampache-match-sql-injection(36121)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36121" }, { "name": "27253", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27253" }, { "name": "http://www.ampache.org/announce/3_3_3_5.php", "refsource": "CONFIRM", "url": "http://www.ampache.org/announce/3_3_3_5.php" }, { "name": "GLSA-200710-13", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200710-13.xml" }, { "name": "26542", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26542" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-4437", "datePublished": "2007-08-20T22:00:00", "dateReserved": "2007-08-20T00:00:00", "dateUpdated": "2024-08-07T14:53:55.993Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-4438
Vulnerability from cvelistv5
Published
2007-08-20 22:00
Modified
2024-08-07 14:53
Severity ?
EPSS score ?
Summary
Session fixation vulnerability in Ampache before 3.3.3.5 allows remote attackers to hijack web sessions via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://bugs.gentoo.org/show_bug.cgi?id=189607 | x_refsource_CONFIRM | |
http://secunia.com/advisories/27253 | third-party-advisory, x_refsource_SECUNIA | |
http://www.ampache.org/announce/3_3_3_5.php | x_refsource_CONFIRM | |
http://security.gentoo.org/glsa/glsa-200710-13.xml | vendor-advisory, x_refsource_GENTOO | |
http://secunia.com/advisories/26542 | third-party-advisory, x_refsource_SECUNIA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/36122 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T14:53:56.003Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.gentoo.org/show_bug.cgi?id=189607" }, { "name": "27253", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27253" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ampache.org/announce/3_3_3_5.php" }, { "name": "GLSA-200710-13", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200710-13.xml" }, { "name": "26542", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26542" }, { "name": "ampache-session-hijacking(36122)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36122" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-08-20T00:00:00", "descriptions": [ { "lang": "en", "value": "Session fixation vulnerability in Ampache before 3.3.3.5 allows remote attackers to hijack web sessions via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.gentoo.org/show_bug.cgi?id=189607" }, { "name": "27253", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27253" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ampache.org/announce/3_3_3_5.php" }, { "name": "GLSA-200710-13", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200710-13.xml" }, { "name": "26542", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26542" }, { "name": "ampache-session-hijacking(36122)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36122" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-4438", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Session fixation vulnerability in Ampache before 3.3.3.5 allows remote attackers to hijack web sessions via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://bugs.gentoo.org/show_bug.cgi?id=189607", "refsource": "CONFIRM", "url": "http://bugs.gentoo.org/show_bug.cgi?id=189607" }, { "name": "27253", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27253" }, { "name": "http://www.ampache.org/announce/3_3_3_5.php", "refsource": "CONFIRM", "url": "http://www.ampache.org/announce/3_3_3_5.php" }, { "name": "GLSA-200710-13", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200710-13.xml" }, { "name": "26542", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26542" }, { "name": "ampache-session-hijacking(36122)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36122" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-4438", "datePublished": "2007-08-20T22:00:00", "dateReserved": "2007-08-20T00:00:00", "dateUpdated": "2024-08-07T14:53:56.003Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-28853
Vulnerability from cvelistv5
Published
2024-03-27 13:17
Modified
2024-08-29 19:10
Severity ?
EPSS score ?
Summary
Ampache Stored XSS
References
▼ | URL | Tags |
---|---|---|
https://github.com/ampache/ampache/security/advisories/GHSA-prw2-7cr3-5mx8 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T00:56:58.121Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/ampache/ampache/security/advisories/GHSA-prw2-7cr3-5mx8", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/ampache/ampache/security/advisories/GHSA-prw2-7cr3-5mx8" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:ampache:ampache:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ampache", "vendor": "ampache", "versions": [ { "lessThan": "6.3.1", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-28853", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-22T17:51:39.825800Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-29T19:10:15.169Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "ampache", "vendor": "ampache", "versions": [ { "status": "affected", "version": "\u003c 6.3.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Ampache is a web based audio/video streaming application and file manager. Stored Cross Site Scripting (XSS) vulnerability in ampache before v6.3.1 allows a remote attacker to execute code via a crafted payload to serval parameters in the post request of /preferences.php?action=admin_update_preferences. This vulnerability is fixed in 6.3.1." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.9, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-03-27T13:17:56.679Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/ampache/ampache/security/advisories/GHSA-prw2-7cr3-5mx8", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/ampache/ampache/security/advisories/GHSA-prw2-7cr3-5mx8" } ], "source": { "advisory": "GHSA-prw2-7cr3-5mx8", "discovery": "UNKNOWN" }, "title": "Ampache Stored XSS" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-28853", "datePublished": "2024-03-27T13:17:56.679Z", "dateReserved": "2024-03-11T22:45:07.685Z", "dateUpdated": "2024-08-29T19:10:15.169Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-51485
Vulnerability from cvelistv5
Published
2024-11-11 19:45
Modified
2024-11-12 01:43
Severity ?
EPSS score ?
Summary
Insufficient Validation in Plugins (Activation/Deactivation) in Ampache
References
▼ | URL | Tags |
---|---|---|
https://github.com/ampache/ampache/security/advisories/GHSA-xvfj-w962-hqcx | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-51485", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-12T01:42:51.608338Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-12T01:43:09.444Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "ampache", "vendor": "ampache", "versions": [ { "status": "affected", "version": "\u003c 7.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Ampache is a web based audio/video streaming application and file manager. The current implementation of token parsing fails to properly validate CSRF tokens when activating or deactivating plugins. This vulnerability allows an attacker to exploit CSRF attacks, potentially enabling them to change website features that should only be managed by administrators through malicious requests. This issue has been addressed in version 7.0.1 and all users are advised to upgrade. There are no known workarounds for this vulnerability." } ], "metrics": [ { "cvssV4_0": { "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 5.3, "baseSeverity": "MEDIUM", "privilegesRequired": "LOW", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "CWE-352: Cross-Site Request Forgery (CSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-11T19:45:34.243Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/ampache/ampache/security/advisories/GHSA-xvfj-w962-hqcx", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/ampache/ampache/security/advisories/GHSA-xvfj-w962-hqcx" } ], "source": { "advisory": "GHSA-xvfj-w962-hqcx", "discovery": "UNKNOWN" }, "title": "Insufficient Validation in Plugins (Activation/Deactivation) in Ampache" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-51485", "datePublished": "2024-11-11T19:45:34.243Z", "dateReserved": "2024-10-28T14:20:59.336Z", "dateUpdated": "2024-11-12T01:43:09.444Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-0606
Vulnerability from cvelistv5
Published
2023-02-01 00:00
Modified
2024-08-02 05:17
Severity ?
EPSS score ?
Summary
Cross-site Scripting (XSS) - Reflected in ampache/ampache
References
Impacted products
▼ | Vendor | Product |
---|---|---|
ampache | ampache/ampache |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:17:50.196Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/0bfed46d-ac96-43c4-93fb-13f68b4e711b" }, { "tags": [ "x_transferred" ], "url": "https://github.com/ampache/ampache/commit/d3191503ca856dfe0b33d7cb17717ffd480046cb" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ampache/ampache", "vendor": "ampache", "versions": [ { "lessThan": "5.5.7", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Cross-site Scripting (XSS) - Reflected in GitHub repository ampache/ampache prior to 5.5.7." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.3, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-01T00:00:00", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/0bfed46d-ac96-43c4-93fb-13f68b4e711b" }, { "url": "https://github.com/ampache/ampache/commit/d3191503ca856dfe0b33d7cb17717ffd480046cb" } ], "source": { "advisory": "0bfed46d-ac96-43c4-93fb-13f68b4e711b", "discovery": "EXTERNAL" }, "title": "Cross-site Scripting (XSS) - Reflected in ampache/ampache" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2023-0606", "datePublished": "2023-02-01T00:00:00", "dateReserved": "2023-02-01T00:00:00", "dateUpdated": "2024-08-02T05:17:50.196Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-0771
Vulnerability from cvelistv5
Published
2023-02-10 00:00
Modified
2024-08-02 05:24
Severity ?
EPSS score ?
Summary
SQL Injection in ampache/ampache
References
Impacted products
▼ | Vendor | Product |
---|---|---|
ampache | ampache/ampache |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:24:33.819Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/2493f350-271b-4c38-9e1d-c8fa189c5ce1" }, { "tags": [ "x_transferred" ], "url": "https://github.com/ampache/ampache/commit/c456e66ef6fd8d11390181a40c66910ae01fbf4c" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ampache/ampache", "vendor": "ampache", "versions": [ { "lessThan": "5.5.7,develop", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "SQL Injection in GitHub repository ampache/ampache prior to 5.5.7,develop." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89 Improper Neutralization of Special Elements used in an SQL Command", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-10T00:00:00", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/2493f350-271b-4c38-9e1d-c8fa189c5ce1" }, { "url": "https://github.com/ampache/ampache/commit/c456e66ef6fd8d11390181a40c66910ae01fbf4c" } ], "source": { "advisory": "2493f350-271b-4c38-9e1d-c8fa189c5ce1", "discovery": "EXTERNAL" }, "title": " SQL Injection in ampache/ampache" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2023-0771", "datePublished": "2023-02-10T00:00:00", "dateReserved": "2023-02-10T00:00:00", "dateUpdated": "2024-08-02T05:24:33.819Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-12386
Vulnerability from cvelistv5
Published
2019-08-22 18:21
Modified
2024-08-04 23:17
Severity ?
EPSS score ?
Summary
An issue was discovered in Ampache through 3.9.1. A stored XSS exists in the localplay.php LocalPlay "add instance" functionality. The injected code is reflected in the instances menu. This vulnerability can be abused to force an admin to create a new privileged user whose credentials are known by the attacker.
References
▼ | URL | Tags |
---|---|---|
https://www.tarlogic.com/en/blog/vulnerabilities-in-ampache/ | x_refsource_MISC | |
https://lists.debian.org/debian-lts-announce/2019/11/msg00008.html | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T23:17:39.984Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.tarlogic.com/en/blog/vulnerabilities-in-ampache/" }, { "name": "[debian-lts-announce] 20191111 [SECURITY] [DLA 1988-1] ampache security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2019/11/msg00008.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2019-08-21T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue was discovered in Ampache through 3.9.1. A stored XSS exists in the localplay.php LocalPlay \"add instance\" functionality. The injected code is reflected in the instances menu. This vulnerability can be abused to force an admin to create a new privileged user whose credentials are known by the attacker." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-11-11T15:06:36", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.tarlogic.com/en/blog/vulnerabilities-in-ampache/" }, { "name": "[debian-lts-announce] 20191111 [SECURITY] [DLA 1988-1] ampache security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2019/11/msg00008.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-12386", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Ampache through 3.9.1. A stored XSS exists in the localplay.php LocalPlay \"add instance\" functionality. The injected code is reflected in the instances menu. This vulnerability can be abused to force an admin to create a new privileged user whose credentials are known by the attacker." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.tarlogic.com/en/blog/vulnerabilities-in-ampache/", "refsource": "MISC", "url": "https://www.tarlogic.com/en/blog/vulnerabilities-in-ampache/" }, { "name": "[debian-lts-announce] 20191111 [SECURITY] [DLA 1988-1] ampache security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2019/11/msg00008.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-12386", "datePublished": "2019-08-22T18:21:04", "dateReserved": "2019-05-28T00:00:00", "dateUpdated": "2024-08-04T23:17:39.984Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-47828
Vulnerability from cvelistv5
Published
2024-10-09 18:35
Modified
2024-10-09 20:20
Severity ?
EPSS score ?
Summary
Cross-Site Request Forgery in ampache
References
▼ | URL | Tags |
---|---|---|
https://github.com/ampache/ampache/security/advisories/GHSA-p9cq-2qph-55f2 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:ampache:ampache:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ampache", "vendor": "ampache", "versions": [ { "lessThanOrEqual": "6.6.0", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-47828", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-09T20:19:49.169031Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-09T20:20:57.365Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "ampache", "vendor": "ampache", "versions": [ { "status": "affected", "version": "\u003c= 6.6.0" } ] } ], "descriptions": [ { "lang": "en", "value": "ampache is a web based audio/video streaming application and file manager. A CSRF attack can be performed in order to delete objects (Playlist, smartlist etc.). Cross-Site Request Forgery (CSRF) is an attack that forces authenticated users to submit a request to a Web application against which they are currently authenticated. This vulnerability can be exploited by creating a malicious script with an arbitrary playlist ID belonging to another user. When the user submits the request, their playlist will be deleted. Any User with active sessions who are tricked into submitting a malicious request are impacted, as their playlists or other objects could be deleted without their consent." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "CWE-352: Cross-Site Request Forgery (CSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-09T18:35:20.080Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/ampache/ampache/security/advisories/GHSA-p9cq-2qph-55f2", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/ampache/ampache/security/advisories/GHSA-p9cq-2qph-55f2" } ], "source": { "advisory": "GHSA-p9cq-2qph-55f2", "discovery": "UNKNOWN" }, "title": "Cross-Site Request Forgery in ampache" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-47828", "datePublished": "2024-10-09T18:35:20.080Z", "dateReserved": "2024-10-03T14:06:12.642Z", "dateUpdated": "2024-10-09T20:20:57.365Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-18375
Vulnerability from cvelistv5
Published
2019-05-24 17:42
Modified
2024-08-05 21:20
Severity ?
EPSS score ?
Summary
Ampache 3.8.3 allows PHP Object Instantiation via democratic.ajax.php and democratic.class.php.
References
▼ | URL | Tags |
---|---|---|
https://fenceposterror.github.io/2017/06/16/Hacking-For-Fun-And-Non-Profit.html | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T21:20:50.865Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://fenceposterror.github.io/2017/06/16/Hacking-For-Fun-And-Non-Profit.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Ampache 3.8.3 allows PHP Object Instantiation via democratic.ajax.php and democratic.class.php." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-05-24T17:42:10", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://fenceposterror.github.io/2017/06/16/Hacking-For-Fun-And-Non-Profit.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-18375", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Ampache 3.8.3 allows PHP Object Instantiation via democratic.ajax.php and democratic.class.php." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://fenceposterror.github.io/2017/06/16/Hacking-For-Fun-And-Non-Profit.html", "refsource": "MISC", "url": "https://fenceposterror.github.io/2017/06/16/Hacking-For-Fun-And-Non-Profit.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-18375", "datePublished": "2019-05-24T17:42:10", "dateReserved": "2019-05-24T00:00:00", "dateUpdated": "2024-08-05T21:20:50.865Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-51489
Vulnerability from cvelistv5
Published
2024-11-11 19:37
Modified
2024-11-12 01:44
Severity ?
EPSS score ?
Summary
Insufficient Message Token Validation in Ampache
References
▼ | URL | Tags |
---|---|---|
https://github.com/ampache/ampache/security/advisories/GHSA-4q69-983r-mwwr | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-51489", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-12T01:44:08.987584Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-12T01:44:27.158Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "ampache", "vendor": "ampache", "versions": [ { "status": "affected", "version": "\u003c 7.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Ampache is a web based audio/video streaming application and file manager. The current implementation of token parsing does not adequately validate CSRF tokens when users send messages to one another. This vulnerability could be exploited to forge CSRF attacks, allowing an attacker to send messages to any user, including administrators, if they interact with a malicious request. This issue has been addressed in version 7.0.1 and all users are advised to upgrade. There are no known workarounds for this vulnerability." } ], "metrics": [ { "cvssV4_0": { "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 5.3, "baseSeverity": "MEDIUM", "privilegesRequired": "LOW", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "CWE-352: Cross-Site Request Forgery (CSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-11T19:37:45.808Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/ampache/ampache/security/advisories/GHSA-4q69-983r-mwwr", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/ampache/ampache/security/advisories/GHSA-4q69-983r-mwwr" } ], "source": { "advisory": "GHSA-4q69-983r-mwwr", "discovery": "UNKNOWN" }, "title": "Insufficient Message Token Validation in Ampache" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-51489", "datePublished": "2024-11-11T19:37:45.808Z", "dateReserved": "2024-10-28T14:20:59.336Z", "dateUpdated": "2024-11-12T01:44:27.158Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2006-5668
Vulnerability from cvelistv5
Published
2006-11-03 01:00
Modified
2024-08-07 19:55
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in Ampache 3.3.2 and earlier, when register_globals is enabled, allows remote attackers to bypass security restrictions and gain guest access.
References
▼ | URL | Tags |
---|---|---|
http://www.vupen.com/english/advisories/2006/4236 | vdb-entry, x_refsource_VUPEN | |
http://www.securityfocus.com/bid/20798 | vdb-entry, x_refsource_BID | |
https://svn.ampache.org/branches/3.3.2/docs/CHANGELOG | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/29892 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/22842 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T19:55:54.027Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2006-4236", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/4236" }, { "name": "20798", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/20798" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://svn.ampache.org/branches/3.3.2/docs/CHANGELOG" }, { "name": "ampache-session-security-bypass(29892)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29892" }, { "name": "22842", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22842" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-10-16T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Ampache 3.3.2 and earlier, when register_globals is enabled, allows remote attackers to bypass security restrictions and gain guest access." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-19T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ADV-2006-4236", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/4236" }, { "name": "20798", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/20798" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://svn.ampache.org/branches/3.3.2/docs/CHANGELOG" }, { "name": "ampache-session-security-bypass(29892)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29892" }, { "name": "22842", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22842" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-5668", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in Ampache 3.3.2 and earlier, when register_globals is enabled, allows remote attackers to bypass security restrictions and gain guest access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2006-4236", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/4236" }, { "name": "20798", "refsource": "BID", "url": "http://www.securityfocus.com/bid/20798" }, { "name": "https://svn.ampache.org/branches/3.3.2/docs/CHANGELOG", "refsource": "CONFIRM", "url": "https://svn.ampache.org/branches/3.3.2/docs/CHANGELOG" }, { "name": "ampache-session-security-bypass(29892)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29892" }, { "name": "22842", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/22842" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-5668", "datePublished": "2006-11-03T01:00:00", "dateReserved": "2006-11-02T00:00:00", "dateUpdated": "2024-08-07T19:55:54.027Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-51486
Vulnerability from cvelistv5
Published
2024-11-11 19:44
Modified
2024-11-12 01:43
Severity ?
EPSS score ?
Summary
Stored Cross-Site Scripting in Ampache
References
▼ | URL | Tags |
---|---|---|
https://github.com/ampache/ampache/security/advisories/GHSA-4xw5-f7xm-vpw5 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-51486", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-12T01:43:11.079429Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-12T01:43:28.573Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "ampache", "vendor": "ampache", "versions": [ { "status": "affected", "version": "\u003c 7.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Ampache is a web based audio/video streaming application and file manager. The vulnerability exists in the interface section of the Ampache menu, where users can change the \"Custom URL\u200a-\u200aFavicon\". This section is not properly sanitized, allowing for the input of strings that can execute JavaScript. This issue has been addressed in version 7.0.1 and all users are advised to upgrade. There are no known workarounds for this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-11T19:44:55.279Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/ampache/ampache/security/advisories/GHSA-4xw5-f7xm-vpw5", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/ampache/ampache/security/advisories/GHSA-4xw5-f7xm-vpw5" } ], "source": { "advisory": "GHSA-4xw5-f7xm-vpw5", "discovery": "UNKNOWN" }, "title": "Stored Cross-Site Scripting in Ampache" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-51486", "datePublished": "2024-11-11T19:44:55.279Z", "dateReserved": "2024-10-28T14:20:59.336Z", "dateUpdated": "2024-11-12T01:43:28.573Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }