CVE-2024-1020
Ruifang-tech
CVE-2024-1020: Cross-site Scripting (XSS) vulnerability in Rebuild up to 3.5.5 allows remote attackers to inject arbitrary web script or HTML via the url parameter in the getStorageFile function. This vulnerability, impacting the /filex/proxy-download file, poses a risk of malicious script execution within a user's browser. Even though the CVSS score is 6.1, the SVRS score of 58 indicates a moderate risk, showing factors beyond technical severity might influence the real-world threat. Successful exploitation of CVE-2024-1020 can lead to session hijacking, defacement, or redirection to malicious sites. Since the exploit is publicly available, organizations using affected versions of Rebuild should apply necessary patches or mitigations promptly to prevent potential attacks. The vulnerability stems from improper input validation, making it crucial to sanitize user-supplied data to prevent XSS attacks. The presence of the "In The Wild" tag suggests active exploitation attempts may be occurring.
Indicators of Compromise
Exploits
News
Social Media
Affected Software
References
CWE Details
CVE Radar
Real-time CVE Intelligence & Vulnerability Management Platform
CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.