
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability in Koji was discovered that involves unsanitized input allowing for an XSS (Cross-Site Scripting) attack. The vulnerability, identified as CVE-2024-9427, was disclosed on December 23, 2024. The issue affects Koji systems where Javascript code from a malicious link could be reflected in the resulting web page (NVD).
The vulnerability stems from unsanitized input in the query string fields of Fedora Koji. The issue has been classified with CWE-116 (Improper Encoding or Escaping of Output). The vulnerability has been assigned a CVSS v3.1 base score of 5.4 (Medium) with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N (NVD).
While the vulnerability allows for XSS attacks through reflected Javascript code, the impact is somewhat limited due to existing XSS protections in the code. It is specifically noted that the vulnerability is not expected to allow attackers to submit actions or make changes in Koji (NVD).
The vulnerability has been documented in the Koji project's CVE documentation. For detailed mitigation information, users can refer to the official Koji CVE documentation (Bugzilla).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."