HyperView Geoportal Toolkit in versions lower than 8.5.0 does not restrict cross-domain requests when fetching remote content pointed by one of GET request parameters. An unauthenticated remote attacker can prepare links, which upon opening will load scripts from a remote location controlled by the attacker and execute them in the user space. By manipulating this parameter it is also possible to enumerate some of the devices in Local Area Network in which the server resides.
History

Thu, 12 Sep 2024 16:00:00 +0000

Type Values Removed Values Added
First Time appeared Hyperview
Hyperview geoportal Toolkit
Weaknesses NVD-CWE-Other
CPEs cpe:2.3:a:hyperview:geoportal_toolkit:*:*:*:*:*:*:*:*
Vendors & Products Hyperview
Hyperview geoportal Toolkit
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}


Fri, 06 Sep 2024 12:30:00 +0000

Type Values Removed Values Added
Description HyperView Geoportal Toolkit in versions though 8.2.4 does not restrict cross-domain requests when fetching remote content pointed by one of GET request parameters. An unauthenticated remote attacker can prepare links, which upon opening will load scripts from a remote location controlled by the attacker and execute them in the user space. By manipulating this parameter it is also possible to enumerate some of the devices in Local Area Network in which the server resides. HyperView Geoportal Toolkit in versions lower than 8.5.0 does not restrict cross-domain requests when fetching remote content pointed by one of GET request parameters. An unauthenticated remote attacker can prepare links, which upon opening will load scripts from a remote location controlled by the attacker and execute them in the user space. By manipulating this parameter it is also possible to enumerate some of the devices in Local Area Network in which the server resides.

Wed, 28 Aug 2024 14:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 28 Aug 2024 12:00:00 +0000

Type Values Removed Values Added
Description HyperView Geoportal Toolkit in versions though 8.2.4 does not restrict cross-domain requests when fetching remote content pointed by one of GET request parameters. An unauthenticated remote attacker can prepare links, which upon opening will load scripts from a remote location controlled by the attacker and execute them in the user space. By manipulating this parameter it is also possible to enumerate some of the devices in Local Area Network in which the server resides.
Title Arbitrary cross-domain file inclusion in HyperView Geoportal Toolkit
Weaknesses CWE-942
References
Metrics cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: CERT-PL

Published: 2024-08-28T11:49:42.295Z

Updated: 2024-09-06T12:24:52.307Z

Reserved: 2024-07-02T12:01:58.421Z

Link: CVE-2024-6449

cve-icon Vulnrichment

Updated: 2024-08-28T13:19:39.310Z

cve-icon NVD

Status : Analyzed

Published: 2024-08-28T12:15:06.340

Modified: 2024-09-12T15:32:19.680

Link: CVE-2024-6449

cve-icon Redhat

No data.