CVE-2024-34697

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-34697
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-34697.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-34697
Related
  • GHSA-985r-6qfc-hg8m
Published
2024-05-14T15:39:27Z
Modified
2025-01-15T05:13:53.577741Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

FreeScout is a free, self-hosted help desk and shared mailbox. A stored HTML Injection vulnerability has been identified in the Email Receival Module of the Freescout Application. The vulnerability allows attackers to inject malicious HTML content into emails sent to the application's mailbox. This vulnerability arises from improper handling of HTML content within incoming emails, allowing attackers to embed malicious HTML code in the context of the application's domain. Unauthenticated attackers can exploit this vulnerability to inject malicious HTML content into emails. This could lead to various attacks such as form hijacking, application defacement, or data exfiltration via CSS injection. Although unauthenticated attackers are limited to HTML injection, the consequences can still be severe. Version 1.8.139 implements strict input validation and sanitization mechanisms to ensure that any HTML content received via emails is properly sanitized to prevent malicious HTML injections.

References

Affected packages

Git / github.com/freescout-help-desk/freescout

Affected ranges

Type
GIT
Repo
https://github.com/freescout-help-desk/freescout
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Affected versions

1.*

1.7.29