CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-22075

High Severity
Firefly-iii
SVRS
63/100

CVSSv3
6.1/10

EPSS
0.00061/1

CVE-2024-22075: Firefly III Webhooks HTML Injection Vulnerability. This security flaw in versions prior to 6.1.1 enables attackers to inject malicious HTML code via webhooks. While the CVSS score is moderate, understand the risk of exploitation.

CVE-2024-22075 poses a HTML injection risk within the Firefly III application. The SVRS score of 63 indicates a medium-level threat. Successful exploitation could allow attackers to modify the appearance or behavior of the web application, potentially leading to phishing attacks or other malicious activities. Although not critical according to SOCRadar's scale, patching is advised to minimize risk and maintain the integrity of your Firefly III instance. This vulnerability highlights the importance of input validation and output encoding in web applications.

No tags available
CVSS:3.1
AV:N
AC:L
PR:N
UI:R
S:C
C:L
I:L
A:N
2024-01-05

2024-12-16

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

CVE-2024-22075 | firefly-iii up to 6.1.0 Webhooks cross site scripting
vuldb.com2024-12-16
CVE-2024-22075 | firefly-iii up to 6.1.0 Webhooks cross site scripting | A vulnerability was found in firefly-iii up to 6.1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Webhooks Handler. The manipulation leads to basic cross site scripting. This vulnerability is handled as CVE-2024-22075. The attack may be launched remotely. There
vuldb.com
rss
forum
news

Social Media

🚨 Firefly III CVE-2024-22075: When Bypassing Built-in Sanitization Might Backfire. New from @Sonar_Research, see how a Client-Side Path Traversal (CSPT) vulnerability can be used to control data that was assumed to be uncontrollable Read here 👉 https://t.co/i8s07G1kGW https://t.co/t8NI16LopN
0
1
0

Affected Software

Configuration 1
TypeVendorProduct
AppFirefly-iiifirefly_iii

References

ReferenceLink
[email protected]https://github.com/firefly-iii/firefly-iii/releases/tag/v6.1.1
AF854A3A-2127-422B-91AE-364DA2661108https://github.com/firefly-iii/firefly-iii/releases/tag/v6.1.1
[email protected]https://github.com/firefly-iii/firefly-iii/releases/tag/v6.1.1
[email protected]https://www.sonarsource.com/blog/front-end-frameworks-when-bypassing-built-in-sanitization-might-backfire/

CWE Details

CWE IDCWE NameDescription
CWE-79Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence