First published: Wed Feb 14 2024(Updated: )
An HTML injection vulnerability exists where an authenticated, remote attacker with administrator privileges on the Security Center application could modify Repository parameters, which could lead to HTML redirection attacks.
Credit: vulnreport@tenable.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tenable Security Center | <6.3.0 |
Tenable has released Security Center 6.3.0 to address these issues. The installation files can be obtained from the Tenable Downloads Portal: https://www.tenable.com/downloads/security-center https://www.tenable.com/downloads/security-center
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-1471 is classified as a critical vulnerability due to its potential for allowing HTML injection attacks.
To mitigate CVE-2024-1471, ensure that you update Tenable Security Center to a version higher than 6.3.0.
CVE-2024-1471 affects users of Tenable Security Center versions up to 6.3.0 with administrator privileges.
CVE-2024-1471 can lead to HTML redirection attacks, allowing attackers to redirect users to malicious sites.
Yes, CVE-2024-1471 can only be exploited by authenticated users with administrator privileges.