CVE-2024-52583

Source
https://cve.org/CVERecord?id=CVE-2024-52583
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-52583.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-52583
Aliases
  • GHSA-462m-5c66-4pmh
Published
2024-11-18T20:35:16.220Z
Modified
2026-03-14T12:40:11.871251Z
Severity
  • 8.2 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N CVSS Calculator
Summary
WesHacks code includes links to Leostop tracking spyware infested files
Details

The WesHacks GitHub repository provides the official Hackathon competition website source code for the Muweilah Wesgreen Hackathon. The page schedule.html before 17 November 2024 or commit 93dfb83 contains links to Leostop, a site that hosts a malicious injected JavaScript file that occurs when bootstrap is run as well as jquery. Leostop may be a tracking malware and creates 2 JavaScript files, but little else is known about it. The WesHacks website remove all references to Leostop as of 17 November 2024.

Database specific
{
    "cwe_ids": [
        "CWE-494"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/52xxx/CVE-2024-52583.json"
}
References

Affected packages

Git / github.com/definetlynotai/weshack_24

Affected ranges

Type
GIT
Repo
https://github.com/definetlynotai/weshack_24
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Type
GIT
Repo
https://github.com/definetlynotai/weshack_24
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Database specific

unresolved_ranges
[
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "fixed": "17"
            }
        ]
    }
]
source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-52583.json"