CVE-2024-6941

A vulnerability, which was classified as problematic, has been found in ThinkSAAS 3.7.0. This issue affects some unknown processing of the file app/system/action/do.php. The manipulation of the argument site_title/site_subtitle/site_key/site_desc/site_url/site_email/site_icp leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-272063.
References
Link Resource
https://vuldb.com/?id.272063 Third Party Advisory
https://vuldb.com/?ctiid.272063 Permissions Required
https://vuldb.com/?submit.373282 Third Party Advisory
https://github.com/thinksaas/ThinkSAAS/issues/36 Exploit Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:thinksaas:thinksaas:3.7.0:*:*:*:*:*:*:*

History

20 Sep 2024, 23:08

Type Values Removed Values Added
First Time Thinksaas
Thinksaas thinksaas
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.4
CPE cpe:2.3:a:thinksaas:thinksaas:3.7.0:*:*:*:*:*:*:*
References () https://vuldb.com/?id.272063 - () https://vuldb.com/?id.272063 - Third Party Advisory
References () https://vuldb.com/?ctiid.272063 - () https://vuldb.com/?ctiid.272063 - Permissions Required
References () https://github.com/thinksaas/ThinkSAAS/issues/36 - () https://github.com/thinksaas/ThinkSAAS/issues/36 - Exploit, Issue Tracking, Third Party Advisory
References () https://vuldb.com/?submit.373282 - () https://vuldb.com/?submit.373282 - Third Party Advisory

21 Jul 2024, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-21 06:15

Updated : 2024-09-20 23:08


NVD link : CVE-2024-6941

Mitre link : CVE-2024-6941


JSON object : View

Products Affected

thinksaas

  • thinksaas
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')