CVE-2024-28237

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-28237
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-28237.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-28237
Aliases
Related
Published
2024-03-18T22:15:07Z
Modified
2025-01-19T02:41:50.237349Z
Severity
  • 4.8 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versions up until and including 1.9.3 contain a vulnerability that allows malicious admins to configure or talk a victim with administrator rights into configuring a webcam snapshot URL which when tested through the "Test" button included in the web interface will execute JavaScript code in the victims browser when attempting to render the snapshot image. An attacker who successfully talked a victim with admin rights into performing a snapshot test with such a crafted URL could use this to retrieve or modify sensitive configuration settings, interrupt prints or otherwise interact with the OctoPrint instance in a malicious way. The vulnerability is patched in version 1.10.0rc3. OctoPrint administrators are strongly advised to thoroughly vet who has admin access to their installation and what settings they modify based on instructions by strangers.

References

Affected packages

Git / github.com/foosel/octoprint

Affected ranges

Type
GIT
Repo
https://github.com/foosel/octoprint
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Type
GIT
Repo
https://github.com/octoprint/octoprint
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Affected versions

1.*

1.0.0
1.0.0-rc1
1.0.0-rc2
1.1.0
1.1.0-dev
1.1.0-rc1
1.1.0-rc2
1.1.1
1.1.2
1.10.0rc1
1.10.0rc2
1.10.0rc3
1.10.0rc4
1.2.0
1.2.0-dev
1.2.0-rc1
1.2.0-rc2
1.2.0-rc3
1.2.1
1.2.10
1.2.11
1.2.12
1.2.13
1.2.14
1.2.15
1.2.16
1.2.16rc1
1.2.16rc2
1.2.17
1.2.17rc1
1.2.17rc2
1.2.17rc3
1.2.17rc4
1.2.18
1.2.18rc1
1.2.2
1.2.3
1.2.4
1.2.5
1.2.6
1.2.7
1.2.8
1.2.9
1.3.0
1.3.0rc1
1.3.0rc2
1.3.0rc3
1.3.1
1.3.10
1.3.10rc1
1.3.10rc2
1.3.10rc3
1.3.10rc4
1.3.11
1.3.11rc1
1.3.11rc2
1.3.11rc3
1.3.12
1.3.12rc1
1.3.12rc2
1.3.12rc3
1.3.1rc1
1.3.1rc2
1.3.2
1.3.2rc1
1.3.3
1.3.3rc1
1.3.3rc2
1.3.3rc3
1.3.4
1.3.5
1.3.5rc1
1.3.5rc2
1.3.5rc3
1.3.5rc4
1.3.6
1.3.6rc1
1.3.6rc2
1.3.6rc3
1.3.7
1.3.7rc1
1.3.7rc2
1.3.7rc3
1.3.7rc4
1.3.8
1.3.9
1.3.9rc1
1.3.9rc2
1.3.9rc3
1.3.9rc4
1.4.0
1.4.0rc1
1.4.0rc2
1.4.0rc3
1.4.0rc4
1.4.0rc5
1.4.0rc6
1.4.1
1.4.1rc1
1.4.1rc2
1.4.1rc3
1.4.1rc4
1.4.2
1.5.0
1.5.0rc1
1.5.0rc2
1.5.0rc3
1.5.1
1.5.2
1.5.3
1.6.0
1.6.0rc1
1.6.0rc2
1.6.0rc3
1.6.1
1.7.0
1.7.0rc1
1.7.0rc2
1.7.0rc3
1.7.1
1.7.2
1.7.3
1.8.0
1.8.0rc1
1.8.0rc2
1.8.0rc3
1.8.0rc4
1.8.0rc5
1.8.1
1.8.2
1.8.3
1.8.4
1.8.5
1.8.6
1.8.7
1.9.0
1.9.0rc1
1.9.0rc2
1.9.0rc3
1.9.0rc4
1.9.0rc5
1.9.0rc6
1.9.1
1.9.2
1.9.3