Vulnerability in AMSS++ version 4.31, which does not sufficiently encode user-controlled input, resulting in a Cross-Site Scripting (XSS) vulnerability through /amssplus/modules/mail/main/select_send.php, in multiple parameters. This vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and steal their session cookie credentials.
References
Link | Resource |
---|---|
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-amssplus-amss | Third Party Advisory |
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-amssplus-amss | Third Party Advisory |
Configurations
History
17 Apr 2025, 21:04
Type | Values Removed | Values Added |
---|---|---|
First Time |
Amss\+\+ Project amss\+\+
Amss\+\+ Project |
|
CPE | cpe:2.3:a:amss\+\+_project:amss\+\+:4.31:*:*:*:*:*:*:* | |
References | () https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-amssplus-amss - Third Party Advisory |
Information
Published : 2024-03-18 14:15
Updated : 2025-04-17 21:04
NVD link : CVE-2024-2596
Mitre link : CVE-2024-2596
CVE.ORG link : CVE-2024-2596
JSON object : View
Products Affected
amss\+\+_project
- amss\+\+
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')