First published: Mon Jan 15 2024(Updated: )
Cross-Site Scripting in FireEye HXTool affecting version 4.6. This vulnerability allows an attacker to store a specially crafted JavaScript payload in the 'Profile Name' and 'Hostname/IP' parameters that will be triggered when items are loaded.
Credit: cve-coordination@incibe.es
Affected Software | Affected Version | How to fix |
---|---|---|
FireEye HXTool | =4.6 |
The FireEye team is working on fixing the reported vulnerabilities. It is recommended to update affected products to the latest version available.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-0318 is classified as a high severity vulnerability due to its potential for Cross-Site Scripting attacks.
To fix CVE-2024-0318, it is recommended to upgrade FireEye HXTool to the latest version that addresses this vulnerability.
CVE-2024-0318 affects users of FireEye HXTool version 4.6.
CVE-2024-0318 allows attackers to execute arbitrary JavaScript in the context of a user's session, compromising sensitive information.
CVE-2024-0318 can be exploited by storing malicious JavaScript payloads in the 'Profile Name' and 'Hostname/IP' parameters.