CVE-2024-34697

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') (CWE-74)

Published: May 14, 2024 / Updated: 6mo ago

010
CVSS 7.6EPSS 0.04%High
CVE info copied to clipboard

FreeScout is a free, self-hosted help desk and shared mailbox. A stored HTML Injection vulnerability has been identified in the Email Receival Module of the Freescout Application. The vulnerability allows attackers to inject malicious HTML content into emails sent to the application's mailbox. This vulnerability arises from improper handling of HTML content within incoming emails, allowing attackers to embed malicious HTML code in the context of the application's domain. Unauthenticated attackers can exploit this vulnerability to inject malicious HTML content into emails. This could lead to various attacks such as form hijacking, application defacement, or data exfiltration via CSS injection. Although unauthenticated attackers are limited to HTML injection, the consequences can still be severe. Version 1.8.139 implements strict input validation and sanitization mechanisms to ensure that any HTML content received via emails is properly sanitized to prevent malicious HTML injections.

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L

Timeline

EPSS

EPSS Score was set to: 0.04% (Percentile: 8.4%)

May 14, 2024 at 9:24 AM
CVE Assignment

NVD published the first details for CVE-2024-34697

May 14, 2024 at 3:39 PM
First Article

Feedly found the first article mentioning CVE-2024-34697. See article

May 14, 2024 at 3:46 PM / National Vulnerability Database
Static CVE Timeline Graph

Links to Mitre Att&cks

T1562.003: Impair Command History Logging
+null more

Attack Patterns

CAPEC-10: Buffer Overflow via Environment Variables
+null more

News

CVE-2024-34697 | freescout-helpdesk freescout up to 1.8.138 cross site scripting
A vulnerability was found in freescout-helpdesk freescout up to 1.8.138 . It has been classified as problematic . This affects an unknown part. The manipulation leads to basic cross site scripting. This vulnerability is uniquely identified as CVE-2024-34697 . It is possible to initiate the attack remotely. There is no exploit available. It is recommended to upgrade the affected component.
FREESCOUT-HELPDESK FREESCOUT CVE-2024-34697 CVE-2024-34697 Freescout vulnerable to Stored HTML Injection in Editing Received Emails FreeScout is a free, self-hosted help desk and shared mailbox. A stored HTML Injection vulnerability has been identified in the Email Receival Module of the Freescout Application. The vulnerability allows attackers to inject malicious HTML content into emails sent to the application's mailbox. This vulnerability arises from improper handling of HTML content within incoming emails, allowing attackers to embed malicious HTML code in the context of the application's domain. Unauthenticated attackers can exploit this vulnerability to inject malicious HTML content into emails. This could lead to various attacks such as form hijacking, application defacement, or data exfiltration via CSS injection. Although unauthenticated attackers are limited to HTML injection, the consequences can still be severe. Version 1.8.139 implements strict input validation and sanitization mechanisms to ensure that any HTML content received via emails is properly sanitized to prevent malicious HTML injections. https://www. cve.org/CVERecord?id=CVE-2024- 34697 https:// github.com/freescout-helpdesk/ freescout/security/advisories/GHSA-985r-6qfc-hg8m https:// github.com/freescout-helpdesk/ freescout/commit/99a4b4b4e153c82e273e549b9efbf6db4a2d8328 # freescout -helpdesk # freescout # CVE_2024_34697 # bot

CVSS V3.1

Attack Vector:Network
Attack Complexity:Low
Privileges Required:None
User Interaction:Required
Scope:Unchanged
Confidentiality:High
Integrity:Low
Availability Impact:Low

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI