First published: Mon May 06 2024(Updated: )
An issue was discovered in Archer Platform 6 before 2024.04. There is a stored cross-site scripting (XSS) vulnerability. A remote authenticated malicious Archer user could potentially exploit this vulnerability to store malicious HTML or JavaScript code in a trusted application data store. When victim users access the data store through their browsers, the malicious code gets executed in the background of the application and renders content inaccessible. 6.14 P3 (6.14.0.3) is also a fixed release.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
RSA Archer GRC Platform | <2024.04 | |
RSA Archer GRC Platform | ||
RSA Archer | <6.14.0.3 | |
RSA Archer | =2024.03 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-34091 is considered high due to its potential impact on user data and application integrity.
To fix CVE-2024-34091, it is advised to update Archer Platform to version 2024.04 or later.
CVE-2024-34091 affects users of Archer Platform versions prior to 2024.04, particularly those who are remote authenticated users.
CVE-2024-34091 is a stored cross-site scripting (XSS) vulnerability.
No, CVE-2024-34091 requires a remote authenticated user to exploit the vulnerability.