CVE-2023-24769
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows attackers to run harmful scripts on a user's browser by tricking them into clicking a specially crafted link when adding a new change detection watch. It requires the attacker to manipulate the URL, making it possible for them to target users of the affected software version before an update is applied.
Technical Description
Changedetection.io before v0.40.1.1 was discovered to contain a stored cross-site scripting (XSS) vulnerability in the main page. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the URL parameter under the "Add a new change detection watch" function.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:NExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Feb 17, 2023
about 3 years ago
Last Modified
Feb 19, 2026
about 2 months ago
Vendor
webtechnologies
Product
changedetection
Related Vulnerabilities
This vulnerability allows an attacker to overwrite files on the server by uploading a specially crafted ZIP file, which can lead to unauthorized changes or access to sensitive data. It affects versions prior to 0.54.4 of the changedetection tool, so users should upgrade to the latest version to protect against this risk.
This vulnerability allows an attacker to read any file on the server where the changedetection.io application is running by using specially crafted XPath expressions. It can be exploited by anyone who can access the application and does not require any special permissions, making it a significant risk if not updated to the latest version.
An attacker can exploit a vulnerability in changedetection.io to inject malicious JavaScript into the web page, which could then be executed in the browser of anyone visiting that page. This happens when a user accesses a specific URL with a manipulated tag identifier, allowing the attacker to run harmful scripts without needing any special access.