
Cloud Vulnerability DB
コミュニティ主導の脆弱性データベース
A reflected cross-site scripting (XSS) vulnerability was discovered in Snipe-IT v8.3.4 (build 20218), an open-source IT asset management system. The vulnerability exists in the CSV Import workflow where the application returns a progress_message value that is rendered as raw HTML in the admin interface (CyberCrew, NVD).
The vulnerability occurs when an invalid CSV file is uploaded, allowing an attacker to intercept and modify the POST /livewire/update request to inject arbitrary HTML or JavaScript into the progress_message parameter. The server accepts the modified input without proper sanitization and reflects it back to the user, leading to arbitrary JavaScript execution in the browser of any authenticated admin viewing the import page. The vulnerability has been assigned a CVSS v3.1 Base Score of 6.1 MEDIUM (Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) (NVD).
The vulnerability allows attackers to execute arbitrary JavaScript code with admin privileges, potentially leading to installation of malicious browser-based payloads and alteration of Snipe-IT assets, users, or settings. The attack requires user interaction as the admin must be tricked into uploading an invalid CSV file (CyberCrew).
The vulnerability affects Snipe-IT version 8.3.4. Users are advised to upgrade to the latest version of Snipe-IT when a patch becomes available. In the meantime, administrators should exercise caution when using the CSV import functionality and monitor for suspicious activity (Snipe-IT Repo).
ソース: このレポートは AI を使用して生成されました
無料の脆弱性評価
9つのセキュリティドメインにわたるクラウドセキュリティプラクティスを評価して、リスクレベルをベンチマークし、防御のギャップを特定します。
パーソナライズされたデモを見る
"私が今まで見た中で最高のユーザーエクスペリエンスは、クラウドワークロードを完全に可視化します。"
"Wiz を使えば、クラウド環境で何が起こっているかを 1 つの画面で確認することができます"
"Wizが何かを重要視した場合、それは実際に重要であることを私たちは知っています。"