Vulnerability Description
A vulnerability, which was classified as problematic, was found in ThinkSAAS 3.7.0. Affected is an unknown function of the file app/system/action/anti.php of the component Admin Panel Security Center. The manipulation of the argument ip/email/phone leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-272064.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Thinksaas | Thinksaas | 3.70 |
Related Weaknesses (CWE)
References
- https://github.com/thinksaas/ThinkSAAS/issues/37ExploitIssue TrackingThird Party Advisory
- https://vuldb.com/?ctiid.272064Permissions Required
- https://vuldb.com/?id.272064Third Party Advisory
- https://vuldb.com/?submit.373289Third Party Advisory
- https://github.com/thinksaas/ThinkSAAS/issues/37ExploitIssue TrackingThird Party Advisory
- https://vuldb.com/?ctiid.272064Permissions Required
- https://vuldb.com/?id.272064Third Party Advisory
- https://vuldb.com/?submit.373289Third Party Advisory
FAQ
What is CVE-2024-6942?
CVE-2024-6942 is a vulnerability with a CVSS score of 3.5 (LOW). A vulnerability, which was classified as problematic, was found in ThinkSAAS 3.7.0. Affected is an unknown function of the file app/system/action/anti.php of the component Admin Panel Security Center....
How severe is CVE-2024-6942?
CVE-2024-6942 has been rated LOW with a CVSS base score of 3.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-6942?
Check the references section above for vendor advisories and patch information. Affected products include: Thinksaas Thinksaas.