First published: Mon Jan 15 2024(Updated: )
Cross-Site Scripting in FireEye EX, affecting version 9.0.3.936727. Exploitation of this vulnerability allows an attacker to send a specially crafted JavaScript payload via the 'type' and 's_f_name' parameters to an authenticated user to retrieve their session details.
Credit: cve-coordination@incibe.es
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Fireeye Ex 5500 | =9.0.3.936727 | |
Fireeye EX 5500 | ||
All of | ||
FireEye EX 8500 | =9.0.3.936727 | |
Fireeye Ex 8500 Firmware | ||
All of | ||
Fireeye EX 3500 Firmware | =9.0.3.936727 | |
Fireeye EX 3500 Firmware |
The FireEye team is working on fixing the reported vulnerabilities. It is recommended to update affected products to the latest version available.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-0317 is classified as a high severity vulnerability due to its potential for session hijacking.
To fix CVE-2024-0317, upgrade to a patched version of FireEye EX that addresses this vulnerability.
CVE-2024-0317 affects users of FireEye EX versions 9.0.3.936727 on various models.
CVE-2024-0317 is associated with a Cross-Site Scripting (XSS) attack that allows execution of arbitrary JavaScript.
Exploitation of CVE-2024-0317 could allow an attacker to retrieve an authenticated user's session details.