First published: Fri Mar 08 2024(Updated: )
Archer Platform 6.x before 6.14 P2 HF2 (6.14.0.2.2) contains a stored cross-site scripting (XSS) vulnerability. A remote authenticated malicious Archer user could potentially exploit this to store malicious HTML or JavaScript code in a trusted application data store. When victim users access the data store through their browsers, the malicious code gets executed by the web browser in the context of the vulnerable application. 6.13.P3 HF1 (6.13.0.3.1) is also a fixed release.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Archer Platform | <6.14.0.2.2 | |
Archer Platform | ||
RSA Archer | <6.13.0.3.1 | |
RSA Archer | >=6.14.0<6.14.0.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-26313 has been identified as a stored cross-site scripting (XSS) vulnerability that can lead to potentially severe exploitation by authenticated users.
To fix CVE-2024-26313, it is recommended to upgrade to Archer Platform version 6.14.0.2.2 or later as it contains the necessary patches.
CVE-2024-26313 affects users of Archer Platform versions before 6.14.0.2.2.
CVE-2024-26313 is a stored cross-site scripting (XSS) vulnerability that allows users to inject malicious scripts.
No, CVE-2024-26313 can only be exploited by authenticated Archer users with malicious intent.