Vulnerability Description
A vulnerability classified as problematic was found in Rebuild up to 3.5.5. Affected by this vulnerability is the function getStorageFile of the file /filex/proxy-download. The manipulation of the argument url leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-252289 was assigned to this vulnerability.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ruifang-Tech | Rebuild | <= 3.5.5 |
Related Weaknesses (CWE)
References
- https://vuldb.com/?ctiid.252289Permissions RequiredThird Party Advisory
- https://vuldb.com/?id.252289Third Party Advisory
- https://www.yuque.com/mailemonyeyongjuan/tha8tr/gdd3hiwz8uo6ylabExploitThird Party Advisory
- https://vuldb.com/?ctiid.252289Permissions RequiredThird Party Advisory
- https://vuldb.com/?id.252289Third Party Advisory
- https://www.yuque.com/mailemonyeyongjuan/tha8tr/gdd3hiwz8uo6ylabExploitThird Party Advisory
FAQ
What is CVE-2024-1020?
CVE-2024-1020 is a vulnerability with a CVSS score of 3.5 (LOW). A vulnerability classified as problematic was found in Rebuild up to 3.5.5. Affected by this vulnerability is the function getStorageFile of the file /filex/proxy-download. The manipulation of the arg...
How severe is CVE-2024-1020?
CVE-2024-1020 has been rated LOW with a CVSS base score of 3.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-1020?
Check the references section above for vendor advisories and patch information. Affected products include: Ruifang-Tech Rebuild.