First published: Mon Nov 18 2024(Updated: )
An issue was discovered in Veritas Enterprise Vault before 15.1 UPD882911, ZDI-CAN-24696. It allows an authenticated remote attacker to inject a parameter into an HTTP request, allowing for Cross-Site Scripting (XSS) while viewing archived content. This could reflect back to an authenticated user without sanitization if executed by that user.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Symantec Enterprise Vault | <15.1 UPD882911 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-52942 is classified as a high severity vulnerability due to its potential for Cross-Site Scripting (XSS) attacks.
To mitigate CVE-2024-52942, upgrade to Veritas Enterprise Vault version 15.1 UPD882911 or later.
CVE-2024-52942 allows an authenticated attacker to inject parameters into HTTP requests, resulting in XSS while viewing archived content.
CVE-2024-52942 affects users of Veritas Enterprise Vault versions earlier than 15.1 UPD882911.
Currently, there are no published workarounds for CVE-2024-52942, and the best course of action is to update the affected software.