Vulnerability Description
A stored XSS issue was discovered in Archer Platform 6.8 before 2024.06. A remote authenticated malicious Archer user could potentially exploit this to store malicious HTML or JavaScript code in a trusted application data store. When victim users access the data store through their browsers, the malicious code gets executed by the web browser in the context of the vulnerable application. 6.14.P4 (6.14.0.4) and 6.13 P4 (6.13.0.4) are also fixed releases. This vulnerability is similar to, but not identical to, CVE-2023-30639.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Archerirm | Archer | < 6.13.0.4 |
Related Weaknesses (CWE)
References
- https://www.archerirm.community/t5/platform-announcements/announcing-archer-platRelease Notes
- https://www.archerirm.community/t5/platform-announcements/archer-update-for-multVendor Advisory
- https://www.archerirm.community/t5/platform-announcements/announcing-archer-platRelease Notes
- https://www.archerirm.community/t5/platform-announcements/archer-update-for-multVendor Advisory
FAQ
What is CVE-2024-41705?
CVE-2024-41705 is a vulnerability with a CVSS score of 7.1 (HIGH). A stored XSS issue was discovered in Archer Platform 6.8 before 2024.06. A remote authenticated malicious Archer user could potentially exploit this to store malicious HTML or JavaScript code in a tru...
How severe is CVE-2024-41705?
CVE-2024-41705 has been rated HIGH with a CVSS base score of 7.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-41705?
Check the references section above for vendor advisories and patch information. Affected products include: Archerirm Archer.