Логотип exploitDog
bind:CVE-2024-36115
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-36115

Количество 2

Количество 2

nvd логотип

CVE-2024-36115

больше 1 года назад

Reposilite is an open source, lightweight and easy-to-use repository manager for Maven based artifacts in JVM ecosystem. As a Maven repository manager, Reposilite provides the ability to view the artifacts content in the browser, as well as perform administrative tasks via API. The problem lies in the fact that the artifact's content is served via the same origin (protocol/host/port) as the Admin UI. If the artifact contains HTML content with javascript inside, the javascript is executed within the same origin. Therefore, if an authenticated user is viewing the artifacts content, the javascript inside can access the browser's local storage where the user's password (aka 'token-secret') is stored. It is especially dangerous in scenarios where Reposilite is configured to mirror third party repositories, like the Maven Central Repository. Since anyone can publish an artifact to Maven Central under its own name, such malicious packages can be used to attack the Reposilite instance. This is

CVSS3: 7.1
EPSS: Низкий
github логотип

GHSA-9w8w-34vr-65j2

больше 1 года назад

Reposilite artifacts vulnerable to Stored Cross-site Scripting

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-36115

Reposilite is an open source, lightweight and easy-to-use repository manager for Maven based artifacts in JVM ecosystem. As a Maven repository manager, Reposilite provides the ability to view the artifacts content in the browser, as well as perform administrative tasks via API. The problem lies in the fact that the artifact's content is served via the same origin (protocol/host/port) as the Admin UI. If the artifact contains HTML content with javascript inside, the javascript is executed within the same origin. Therefore, if an authenticated user is viewing the artifacts content, the javascript inside can access the browser's local storage where the user's password (aka 'token-secret') is stored. It is especially dangerous in scenarios where Reposilite is configured to mirror third party repositories, like the Maven Central Repository. Since anyone can publish an artifact to Maven Central under its own name, such malicious packages can be used to attack the Reposilite instance. This is

CVSS3: 7.1
3%
Низкий
больше 1 года назад
github логотип
GHSA-9w8w-34vr-65j2

Reposilite artifacts vulnerable to Stored Cross-site Scripting

CVSS3: 7.5
3%
Низкий
больше 1 года назад

Уязвимостей на страницу