Description
Cross-Site Scripting in FireEye EX, affecting version 9.0.3.936727. Exploitation of this vulnerability allows an attacker to send a specially crafted JavaScript payload via the 'type' and 's_f_name' parameters to an authenticated user to retrieve their session details.
Published: 2024-01-15
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

The FireEye team is working on fixing the reported vulnerabilities. It is recommended to update affected products to the latest version available.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-16113 Cross-Site Scripting in FireEye EX, affecting version 9.0.3.936727. Exploitation of this vulnerability allows an attacker to send a specially crafted JavaScript payload via the 'type' and 's_f_name' parameters to an authenticated user to retrieve their session details.
History

Tue, 03 Jun 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Fireeye Ex 3500 Ex 3500 Firmware Ex 5500 Ex 5500 Firmwarea Ex 8500 Ex 8500 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: INCIBE

Published:

Updated: 2025-06-03T13:59:52.149Z

Reserved: 2024-01-08T11:56:03.531Z

Link: CVE-2024-0317

cve-icon Vulnrichment

Updated: 2024-08-01T18:04:48.538Z

cve-icon NVD

Status : Modified

Published: 2024-01-15T17:15:08.850

Modified: 2024-11-21T08:46:18.690

Link: CVE-2024-0317

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses