Vulnerability Description
Portainer before 2.20.0 allows redirects when the target is not index.yaml.
CVSS Score
9.1
CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Portainer | Portainer | < 2.20.0 |
Related Weaknesses (CWE)
References
- https://github.com/portainer/portainer/compare/2.19.4...2.20.0Product
- https://github.com/portainer/portainer/pull/11233Patch
- https://github.com/portainer/portainer/pull/11236Patch
- https://www.portainer.io/Product
- https://github.com/portainer/portainer/compare/2.19.4...2.20.0Product
- https://github.com/portainer/portainer/pull/11233Patch
- https://github.com/portainer/portainer/pull/11236Patch
- https://www.portainer.io/Product
FAQ
What is CVE-2024-33661?
CVE-2024-33661 is a vulnerability with a CVSS score of 9.1 (CRITICAL). Portainer before 2.20.0 allows redirects when the target is not index.yaml.
How severe is CVE-2024-33661?
CVE-2024-33661 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2024-33661?
Check the references section above for vendor advisories and patch information. Affected products include: Portainer Portainer.