CVE-2024-52812
5.4
MediumCVE-2024-52812
•
security-advisories@github.com
•
Awaiting Analysis
Description
LF Edge eKuiper is an internet-of-things data analytics and stream processing engine. Prior to version 2.0.8, auser with rights to modify the service (e.g. kuiperUser role) can inject a cross-site scripting payload into the rule `id` parameter. Then, after any user with access to this service (e.g. admin) tries make any modifications with the rule (update, run, stop, delete), a payload acts in the victim's browser. Version 2.0.8 fixes the issue.
Exploits
No known exploits found for this CVE.
Search Exploit-DBReferences
security-advisories@github.com
https://github.com/lf-edge/ekuiper/blob/dbce32d5a195cf1de949b3a6a4e29f0df0f3330d/internal/server/rest.go#L681security-advisories@github.com
https://github.com/lf-edge/ekuiper/blob/dbce32d5a195cf1de949b3a6a4e29f0df0f3330d/internal/server/rest.go#L716security-advisories@github.com
https://github.com/lf-edge/ekuiper/blob/dbce32d5a195cf1de949b3a6a4e29f0df0f3330d/internal/server/rest.go#L735security-advisories@github.com
https://github.com/lf-edge/ekuiper/blob/dbce32d5a195cf1de949b3a6a4e29f0df0f3330d/internal/server/rest.go#L794security-advisories@github.com
https://github.com/lf-edge/ekuiper/blob/dbce32d5a195cf1de949b3a6a4e29f0df0f3330d/internal/server/rest.go#L809security-advisories@github.com
https://github.com/lf-edge/ekuiper/blob/dbce32d5a195cf1de949b3a6a4e29f0df0f3330d/internal/server/rest.go#L824security-advisories@github.com
https://github.com/lf-edge/ekuiper/releases/tag/v2.0.8security-advisories@github.com
https://github.com/lf-edge/ekuiper/security/advisories/GHSA-6hrw-x7pr-4mp8