CVE-2024-3851 (GCVE-0-2024-3851)
Vulnerability from cvelistv5 – Published: 2024-05-16 09:03 – Updated: 2024-08-01 20:26
VLAI?
Title
Unrestricted File Upload Leading to XSS in imartinez/privategpt
Summary
A stored Cross-Site Scripting (XSS) vulnerability exists in the 'imartinez/privategpt' repository due to improper validation of file uploads. Attackers can exploit this vulnerability by uploading malicious HTML files, such as those containing JavaScript payloads, which are then executed in the context of the victim's session when accessed. This could lead to the execution of arbitrary JavaScript code in the context of the user's browser session, potentially resulting in phishing attacks or other malicious actions. The vulnerability affects the latest version of the repository.
Severity ?
6.8 (Medium)
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| imartinez | imartinez/privategpt |
Affected:
unspecified , ≤ latest
(custom)
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-3851",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-05-16T15:14:39.498709Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-06-04T17:31:54.950Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T20:26:56.909Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://huntr.com/bounties/cae1a492-4e09-4d56-8e11-17703bdfe653"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "imartinez/privategpt",
"vendor": "imartinez",
"versions": [
{
"lessThanOrEqual": "latest",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A stored Cross-Site Scripting (XSS) vulnerability exists in the \u0027imartinez/privategpt\u0027 repository due to improper validation of file uploads. Attackers can exploit this vulnerability by uploading malicious HTML files, such as those containing JavaScript payloads, which are then executed in the context of the victim\u0027s session when accessed. This could lead to the execution of arbitrary JavaScript code in the context of the user\u0027s browser session, potentially resulting in phishing attacks or other malicious actions. The vulnerability affects the latest version of the repository."
}
],
"metrics": [
{
"cvssV3_0": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N",
"version": "3.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-05-16T09:03:44.053Z",
"orgId": "c09c270a-b464-47c1-9133-acb35b22c19a",
"shortName": "@huntr_ai"
},
"references": [
{
"url": "https://huntr.com/bounties/cae1a492-4e09-4d56-8e11-17703bdfe653"
}
],
"source": {
"advisory": "cae1a492-4e09-4d56-8e11-17703bdfe653",
"discovery": "EXTERNAL"
},
"title": "Unrestricted File Upload Leading to XSS in imartinez/privategpt"
}
},
"cveMetadata": {
"assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a",
"assignerShortName": "@huntr_ai",
"cveId": "CVE-2024-3851",
"datePublished": "2024-05-16T09:03:44.053Z",
"dateReserved": "2024-04-15T19:56:29.659Z",
"dateUpdated": "2024-08-01T20:26:56.909Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"descriptions": "[{\"lang\": \"en\", \"value\": \"A stored Cross-Site Scripting (XSS) vulnerability exists in the \u0027imartinez/privategpt\u0027 repository due to improper validation of file uploads. Attackers can exploit this vulnerability by uploading malicious HTML files, such as those containing JavaScript payloads, which are then executed in the context of the victim\u0027s session when accessed. This could lead to the execution of arbitrary JavaScript code in the context of the user\u0027s browser session, potentially resulting in phishing attacks or other malicious actions. The vulnerability affects the latest version of the repository.\"}, {\"lang\": \"es\", \"value\": \"Existe una vulnerabilidad de cross-site scripting (XSS) almacenado en el repositorio \u0027imartinez/privategpt\u0027 debido a una validaci\\u00f3n incorrecta de la carga de archivos. Los atacantes pueden aprovechar esta vulnerabilidad cargando archivos HTML maliciosos, como los que contienen payloads de JavaScript, que luego se ejecutan en el contexto de la sesi\\u00f3n de la v\\u00edctima cuando se accede a ellos. Esto podr\\u00eda dar lugar a la ejecuci\\u00f3n de c\\u00f3digo JavaScript arbitrario en el contexto de la sesi\\u00f3n del navegador del usuario, lo que podr\\u00eda dar lugar a ataques de phishing u otras acciones maliciosas. La vulnerabilidad afecta a la \\u00faltima versi\\u00f3n del repositorio.\"}]",
"id": "CVE-2024-3851",
"lastModified": "2024-11-21T09:30:32.560",
"metrics": "{\"cvssMetricV30\": [{\"source\": \"security@huntr.dev\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N\", \"baseScore\": 6.8, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"REQUIRED\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.3, \"impactScore\": 4.0}]}",
"published": "2024-05-16T09:15:14.823",
"references": "[{\"url\": \"https://huntr.com/bounties/cae1a492-4e09-4d56-8e11-17703bdfe653\", \"source\": \"security@huntr.dev\"}, {\"url\": \"https://huntr.com/bounties/cae1a492-4e09-4d56-8e11-17703bdfe653\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "security@huntr.dev",
"vulnStatus": "Awaiting Analysis",
"weaknesses": "[{\"source\": \"security@huntr.dev\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-79\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-3851\",\"sourceIdentifier\":\"security@huntr.dev\",\"published\":\"2024-05-16T09:15:14.823\",\"lastModified\":\"2025-05-19T16:13:38.820\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A stored Cross-Site Scripting (XSS) vulnerability exists in the \u0027imartinez/privategpt\u0027 repository due to improper validation of file uploads. Attackers can exploit this vulnerability by uploading malicious HTML files, such as those containing JavaScript payloads, which are then executed in the context of the victim\u0027s session when accessed. This could lead to the execution of arbitrary JavaScript code in the context of the user\u0027s browser session, potentially resulting in phishing attacks or other malicious actions. The vulnerability affects the latest version of the repository.\"},{\"lang\":\"es\",\"value\":\"Existe una vulnerabilidad de cross-site scripting (XSS) almacenado en el repositorio \u0027imartinez/privategpt\u0027 debido a una validaci\u00f3n incorrecta de la carga de archivos. Los atacantes pueden aprovechar esta vulnerabilidad cargando archivos HTML maliciosos, como los que contienen payloads de JavaScript, que luego se ejecutan en el contexto de la sesi\u00f3n de la v\u00edctima cuando se accede a ellos. Esto podr\u00eda dar lugar a la ejecuci\u00f3n de c\u00f3digo JavaScript arbitrario en el contexto de la sesi\u00f3n del navegador del usuario, lo que podr\u00eda dar lugar a ataques de phishing u otras acciones maliciosas. La vulnerabilidad afecta a la \u00faltima versi\u00f3n del repositorio.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N\",\"baseScore\":5.4,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.3,\"impactScore\":2.7}],\"cvssMetricV30\":[{\"source\":\"security@huntr.dev\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N\",\"baseScore\":6.8,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.3,\"impactScore\":4.0}]},\"weaknesses\":[{\"source\":\"security@huntr.dev\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pribai:privategpt:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"0.6.2\",\"matchCriteriaId\":\"C7CE5FFB-FCCC-4FE0-8155-9673297E8C94\"}]}]}],\"references\":[{\"url\":\"https://huntr.com/bounties/cae1a492-4e09-4d56-8e11-17703bdfe653\",\"source\":\"security@huntr.dev\",\"tags\":[\"Third Party Advisory\",\"Exploit\",\"Issue Tracking\"]},{\"url\":\"https://huntr.com/bounties/cae1a492-4e09-4d56-8e11-17703bdfe653\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"Exploit\",\"Issue Tracking\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://huntr.com/bounties/cae1a492-4e09-4d56-8e11-17703bdfe653\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-01T20:26:56.909Z\"}}, {\"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-3851\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-05-16T15:14:39.498709Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-05-16T15:14:43.724Z\"}, \"title\": \"CISA ADP Vulnrichment\"}], \"cna\": {\"title\": \"Unrestricted File Upload Leading to XSS in imartinez/privategpt\", \"source\": {\"advisory\": \"cae1a492-4e09-4d56-8e11-17703bdfe653\", \"discovery\": \"EXTERNAL\"}, \"metrics\": [{\"cvssV3_0\": {\"scope\": \"CHANGED\", \"version\": \"3.0\", \"baseScore\": 6.8, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"vendor\": \"imartinez\", \"product\": \"imartinez/privategpt\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"latest\"}]}], \"references\": [{\"url\": \"https://huntr.com/bounties/cae1a492-4e09-4d56-8e11-17703bdfe653\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A stored Cross-Site Scripting (XSS) vulnerability exists in the \u0027imartinez/privategpt\u0027 repository due to improper validation of file uploads. Attackers can exploit this vulnerability by uploading malicious HTML files, such as those containing JavaScript payloads, which are then executed in the context of the victim\u0027s session when accessed. This could lead to the execution of arbitrary JavaScript code in the context of the user\u0027s browser session, potentially resulting in phishing attacks or other malicious actions. The vulnerability affects the latest version of the repository.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-79\", \"description\": \"CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"c09c270a-b464-47c1-9133-acb35b22c19a\", \"shortName\": \"@huntr_ai\", \"dateUpdated\": \"2024-05-16T09:03:44.053Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-3851\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-08-01T20:26:56.909Z\", \"dateReserved\": \"2024-04-15T19:56:29.659Z\", \"assignerOrgId\": \"c09c270a-b464-47c1-9133-acb35b22c19a\", \"datePublished\": \"2024-05-16T09:03:44.053Z\", \"assignerShortName\": \"@huntr_ai\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…