Vulnerability in AMSS++ version 4.31, which does not sufficiently encode user-controlled input, resulting in a Cross-Site Scripting (XSS) vulnerability through /amssplus/admin/index.php, in multiple parameters. This vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and steal their session cookie credentials.
References
Link | Resource |
---|---|
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-amssplus-amss | Third Party Advisory |
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-amssplus-amss | Third Party Advisory |
Configurations
History
17 Apr 2025, 21:02
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:amss\+\+_project:amss\+\+:4.31:*:*:*:*:*:*:* | |
First Time |
Amss\+\+ Project amss\+\+
Amss\+\+ Project |
|
References | () https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-amssplus-amss - Third Party Advisory |
Information
Published : 2024-03-18 14:15
Updated : 2025-04-17 21:02
NVD link : CVE-2024-2594
Mitre link : CVE-2024-2594
CVE.ORG link : CVE-2024-2594
JSON object : View
Products Affected
amss\+\+_project
- amss\+\+
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')