Логотип exploitDog
bind:CVE-2024-23633
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-23633

Количество 3

Количество 3

nvd логотип

CVE-2024-23633

около 2 лет назад

Label Studio, an open source data labeling tool had a remote import feature allowed users to import data from a remote web source, that was downloaded and could be viewed on the website. Prior to version 1.10.1, this feature could had been abused to download a HTML file that executed malicious JavaScript code in the context of the Label Studio website. Executing arbitrary JavaScript could result in an attacker performing malicious actions on Label Studio users if they visit the crafted avatar image. For an example, an attacker can craft a JavaScript payload that adds a new Django Super Administrator user if a Django administrator visits the image. `data_import/uploader.py` lines 125C5 through 146 showed that if a URL passed the server side request forgery verification checks, the contents of the file would be downloaded using the filename in the URL. The downloaded file path could then be retrieved by sending a request to `/api/projects/{project_id}/file-uploads?ids=[{download_id}]` w

CVSS3: 4.7
EPSS: Низкий
debian логотип

CVE-2024-23633

около 2 лет назад

Label Studio, an open source data labeling tool had a remote import fe ...

CVSS3: 4.7
EPSS: Низкий
github логотип

GHSA-fq23-g58m-799r

около 2 лет назад

Cross-site Scripting Vulnerability on Data Import

CVSS3: 4.7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-23633

Label Studio, an open source data labeling tool had a remote import feature allowed users to import data from a remote web source, that was downloaded and could be viewed on the website. Prior to version 1.10.1, this feature could had been abused to download a HTML file that executed malicious JavaScript code in the context of the Label Studio website. Executing arbitrary JavaScript could result in an attacker performing malicious actions on Label Studio users if they visit the crafted avatar image. For an example, an attacker can craft a JavaScript payload that adds a new Django Super Administrator user if a Django administrator visits the image. `data_import/uploader.py` lines 125C5 through 146 showed that if a URL passed the server side request forgery verification checks, the contents of the file would be downloaded using the filename in the URL. The downloaded file path could then be retrieved by sending a request to `/api/projects/{project_id}/file-uploads?ids=[{download_id}]` w

CVSS3: 4.7
0%
Низкий
около 2 лет назад
debian логотип
CVE-2024-23633

Label Studio, an open source data labeling tool had a remote import fe ...

CVSS3: 4.7
0%
Низкий
около 2 лет назад
github логотип
GHSA-fq23-g58m-799r

Cross-site Scripting Vulnerability on Data Import

CVSS3: 4.7
0%
Низкий
около 2 лет назад

Уязвимостей на страницу