CVE-2024-6585 (GCVE-0-2024-6585)
Vulnerability from cvelistv5 – Published: 2024-08-30 22:17 – Updated: 2024-09-03 14:52
VLAI?
Summary
Multiple stored cross-site scripting (“XSS”) vulnerabilities in the markdown dashboard and dashboard comment functionality of Lightdash version 0.1024.6 allows remote authenticated threat actors to inject malicious scripts into vulnerable web pages. A threat actor could potentially exploit this vulnerability to store malicious JavaScript which executes in the context of a user’s session with the application.
Severity ?
5.4 (Medium)
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Assigner
References
Impacted products
Credits
Kenneth Chiong, Mandiant
Kenneth Chiong, Mandiant
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:lightdash:lightdash:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "lightdash",
"vendor": "lightdash",
"versions": [
{
"lessThan": "0.1042.2",
"status": "affected",
"version": "0.1024.6",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-6585",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-09-03T14:50:48.806492Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-09-03T14:52:05.350Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"collectionURL": "https://github.com/lightdash/lightdash",
"defaultStatus": "affected",
"product": "Lightdash",
"vendor": "Lightdash",
"versions": [
{
"changes": [
{
"at": "0.1042.2",
"status": "unaffected"
}
],
"lessThan": "0.1042.2",
"status": "affected",
"version": "0.1024.6",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Kenneth Chiong, Mandiant"
},
{
"lang": "en",
"type": "reporter",
"value": "Kenneth Chiong, Mandiant"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Multiple stored cross-site scripting (\u201cXSS\u201d) vulnerabilities in the markdown dashboard and dashboard comment functionality of Lightdash version 0.1024.6 allows remote authenticated threat actors to inject malicious scripts into vulnerable web pages. A threat actor could potentially exploit this vulnerability to store malicious JavaScript which executes in the context of a user\u2019s session with the application."
}
],
"value": "Multiple stored cross-site scripting (\u201cXSS\u201d) vulnerabilities in the markdown dashboard and dashboard comment functionality of Lightdash version 0.1024.6 allows remote authenticated threat actors to inject malicious scripts into vulnerable web pages. A threat actor could potentially exploit this vulnerability to store malicious JavaScript which executes in the context of a user\u2019s session with the application."
}
],
"impacts": [
{
"descriptions": [
{
"lang": "en",
"value": "xss"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-08-30T22:20:44.647Z",
"orgId": "027e81ed-0dd4-4685-ab4d-884aec5bb484",
"shortName": "Mandiant"
},
"references": [
{
"url": "https://github.com/google/security-research/security/advisories/GHSA-6529-6jv3-66q2"
},
{
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6585"
},
{
"url": "https://github.com/lightdash/lightdash"
},
{
"url": "https://github.com/lightdash/lightdash/releases/tag/0.1042.2"
},
{
"url": "https://patch-diff.githubusercontent.com/raw/lightdash/lightdash/pull/9510.patch"
},
{
"url": "https://patch-diff.githubusercontent.com/raw/lightdash/lightdash/pull/9359.patch"
},
{
"url": "https://github.com/lightdash/lightdash/pull/9510"
},
{
"url": "https://github.com/lightdash/lightdash/pull/9359"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "027e81ed-0dd4-4685-ab4d-884aec5bb484",
"assignerShortName": "Mandiant",
"cveId": "CVE-2024-6585",
"datePublished": "2024-08-30T22:17:28.565Z",
"dateReserved": "2024-07-08T21:24:56.349Z",
"dateUpdated": "2024-09-03T14:52:05.350Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"descriptions": "[{\"lang\": \"en\", \"value\": \"Multiple stored cross-site scripting (\\u201cXSS\\u201d) vulnerabilities in the markdown dashboard and dashboard comment functionality of Lightdash version 0.1024.6 allows remote authenticated threat actors to inject malicious scripts into vulnerable web pages. A threat actor could potentially exploit this vulnerability to store malicious JavaScript which executes in the context of a user\\u2019s session with the application.\"}, {\"lang\": \"es\", \"value\": \"Varias vulnerabilidades de cross site scripting (\\u201cXSS\\u201d) almacenado en el panel de control de Markdown y la funcionalidad de comentarios del panel de control de la versi\\u00f3n 0.1024.6 de Lightdash permiten que actores de amenazas autenticados de forma remota inyecten secuencias de comandos maliciosas en p\\u00e1ginas web vulnerables. Un actor de amenazas podr\\u00eda explotar esta vulnerabilidad para almacenar c\\u00f3digo JavaScript malicioso que se ejecuta en el contexto de la sesi\\u00f3n de un usuario con la aplicaci\\u00f3n.\"}]",
"id": "CVE-2024-6585",
"lastModified": "2024-09-03T15:35:16.350",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N\", \"baseScore\": 5.4, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"REQUIRED\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.3, \"impactScore\": 2.7}]}",
"published": "2024-08-30T23:15:12.627",
"references": "[{\"url\": \"https://github.com/google/security-research/security/advisories/GHSA-6529-6jv3-66q2\", \"source\": \"mandiant-cve@google.com\"}, {\"url\": \"https://github.com/lightdash/lightdash\", \"source\": \"mandiant-cve@google.com\"}, {\"url\": \"https://github.com/lightdash/lightdash/pull/9359\", \"source\": \"mandiant-cve@google.com\"}, {\"url\": \"https://github.com/lightdash/lightdash/pull/9510\", \"source\": \"mandiant-cve@google.com\"}, {\"url\": \"https://github.com/lightdash/lightdash/releases/tag/0.1042.2\", \"source\": \"mandiant-cve@google.com\"}, {\"url\": \"https://patch-diff.githubusercontent.com/raw/lightdash/lightdash/pull/9359.patch\", \"source\": \"mandiant-cve@google.com\"}, {\"url\": \"https://patch-diff.githubusercontent.com/raw/lightdash/lightdash/pull/9510.patch\", \"source\": \"mandiant-cve@google.com\"}, {\"url\": \"https://www.cve.org/CVERecord?id=CVE-2024-6585\", \"source\": \"mandiant-cve@google.com\"}]",
"sourceIdentifier": "mandiant-cve@google.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": "[{\"source\": \"mandiant-cve@google.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-79\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-6585\",\"sourceIdentifier\":\"mandiant-cve@google.com\",\"published\":\"2024-08-30T23:15:12.627\",\"lastModified\":\"2024-09-03T15:35:16.350\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple stored cross-site scripting (\u201cXSS\u201d) vulnerabilities in the markdown dashboard and dashboard comment functionality of Lightdash version 0.1024.6 allows remote authenticated threat actors to inject malicious scripts into vulnerable web pages. A threat actor could potentially exploit this vulnerability to store malicious JavaScript which executes in the context of a user\u2019s session with the application.\"},{\"lang\":\"es\",\"value\":\"Varias vulnerabilidades de cross site scripting (\u201cXSS\u201d) almacenado en el panel de control de Markdown y la funcionalidad de comentarios del panel de control de la versi\u00f3n 0.1024.6 de Lightdash permiten que actores de amenazas autenticados de forma remota inyecten secuencias de comandos maliciosas en p\u00e1ginas web vulnerables. Un actor de amenazas podr\u00eda explotar esta vulnerabilidad para almacenar c\u00f3digo JavaScript malicioso que se ejecuta en el contexto de la sesi\u00f3n de un usuario con la aplicaci\u00f3n.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N\",\"baseScore\":5.4,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.3,\"impactScore\":2.7}]},\"weaknesses\":[{\"source\":\"mandiant-cve@google.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"references\":[{\"url\":\"https://github.com/google/security-research/security/advisories/GHSA-6529-6jv3-66q2\",\"source\":\"mandiant-cve@google.com\"},{\"url\":\"https://github.com/lightdash/lightdash\",\"source\":\"mandiant-cve@google.com\"},{\"url\":\"https://github.com/lightdash/lightdash/pull/9359\",\"source\":\"mandiant-cve@google.com\"},{\"url\":\"https://github.com/lightdash/lightdash/pull/9510\",\"source\":\"mandiant-cve@google.com\"},{\"url\":\"https://github.com/lightdash/lightdash/releases/tag/0.1042.2\",\"source\":\"mandiant-cve@google.com\"},{\"url\":\"https://patch-diff.githubusercontent.com/raw/lightdash/lightdash/pull/9359.patch\",\"source\":\"mandiant-cve@google.com\"},{\"url\":\"https://patch-diff.githubusercontent.com/raw/lightdash/lightdash/pull/9510.patch\",\"source\":\"mandiant-cve@google.com\"},{\"url\":\"https://www.cve.org/CVERecord?id=CVE-2024-6585\",\"source\":\"mandiant-cve@google.com\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 5.4, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"LOW\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-6585\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-03T14:50:48.806492Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:lightdash:lightdash:*:*:*:*:*:*:*:*\"], \"vendor\": \"lightdash\", \"product\": \"lightdash\", \"versions\": [{\"status\": \"affected\", \"version\": \"0.1024.6\", \"lessThan\": \"0.1042.2\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-03T14:51:56.889Z\"}}], \"cna\": {\"source\": {\"discovery\": \"UNKNOWN\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Kenneth Chiong, Mandiant\"}, {\"lang\": \"en\", \"type\": \"reporter\", \"value\": \"Kenneth Chiong, Mandiant\"}], \"impacts\": [{\"descriptions\": [{\"lang\": \"en\", \"value\": \"xss\"}]}], \"affected\": [{\"vendor\": \"Lightdash\", \"product\": \"Lightdash\", \"versions\": [{\"status\": \"affected\", \"changes\": [{\"at\": \"0.1042.2\", \"status\": \"unaffected\"}], \"version\": \"0.1024.6\", \"lessThan\": \"0.1042.2\", \"versionType\": \"custom\"}], \"collectionURL\": \"https://github.com/lightdash/lightdash\", \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://github.com/google/security-research/security/advisories/GHSA-6529-6jv3-66q2\"}, {\"url\": \"https://www.cve.org/CVERecord?id=CVE-2024-6585\"}, {\"url\": \"https://github.com/lightdash/lightdash\"}, {\"url\": \"https://github.com/lightdash/lightdash/releases/tag/0.1042.2\"}, {\"url\": \"https://patch-diff.githubusercontent.com/raw/lightdash/lightdash/pull/9510.patch\"}, {\"url\": \"https://patch-diff.githubusercontent.com/raw/lightdash/lightdash/pull/9359.patch\"}, {\"url\": \"https://github.com/lightdash/lightdash/pull/9510\"}, {\"url\": \"https://github.com/lightdash/lightdash/pull/9359\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Multiple stored cross-site scripting (\\u201cXSS\\u201d) vulnerabilities in the markdown dashboard and dashboard comment functionality of Lightdash version 0.1024.6 allows remote authenticated threat actors to inject malicious scripts into vulnerable web pages. A threat actor could potentially exploit this vulnerability to store malicious JavaScript which executes in the context of a user\\u2019s session with the application.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"Multiple stored cross-site scripting (\\u201cXSS\\u201d) vulnerabilities in the markdown dashboard and dashboard comment functionality of Lightdash version 0.1024.6 allows remote authenticated threat actors to inject malicious scripts into vulnerable web pages. A threat actor could potentially exploit this vulnerability to store malicious JavaScript which executes in the context of a user\\u2019s session with the application.\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-79\", \"description\": \"CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"027e81ed-0dd4-4685-ab4d-884aec5bb484\", \"shortName\": \"Mandiant\", \"dateUpdated\": \"2024-08-30T22:20:44.647Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-6585\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-09-03T14:52:05.350Z\", \"dateReserved\": \"2024-07-08T21:24:56.349Z\", \"assignerOrgId\": \"027e81ed-0dd4-4685-ab4d-884aec5bb484\", \"datePublished\": \"2024-08-30T22:17:28.565Z\", \"assignerShortName\": \"Mandiant\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…