CVE-2024-49379

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-49379
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-49379.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-49379
Published
2024-11-13T17:18:47.547Z
Modified
2025-12-01T13:55:24.514720Z
Severity
  • 5.3 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N CVSS Calculator
Summary
Remote Code Execution (RCE) via Cross-Site Scripting (XSS) in Umbrel
Details

Umbrel is a home server OS for self-hosting. The login functionality of Umbrel before version 1.2.2 contains a reflected cross-site scripting (XSS) vulnerability in use-auth.tsx. An attacker can specify a malicious redirect query parameter to trigger the vulnerability. If a JavaScript URL is passed to the redirect parameter the attacker provided JavaScript will be executed after the user entered their password and clicked on login. This vulnerability is fixed in 1.2.2.

Database specific
{
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/49xxx/CVE-2024-49379.json",
    "cwe_ids": [
        "CWE-79"
    ]
}
References

Affected packages

Git / github.com/getumbrel/umbrel

Affected ranges

Type
GIT
Repo
https://github.com/getumbrel/umbrel
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

0.*

0.5.4

1.*

1.1.0
1.1.1
1.1.2
1.2.0
1.2.0-beta.1
1.2.0-beta.2
1.2.1
1.2.2-beta.1

v0.*

v0.1.2
v0.1.3-beta
v0.1.4-beta
v0.1.5-beta
v0.1.6-beta
v0.1.6-beta.2
v0.1.6-beta.3
v0.1.7-beta
v0.2.0
v0.2.1
v0.2.10
v0.2.11
v0.2.12
v0.2.13
v0.2.14
v0.2.15
v0.2.2
v0.2.3
v0.2.4
v0.2.5
v0.2.6
v0.2.7
v0.2.8
v0.2.9
v0.3.0
v0.3.1
v0.3.10
v0.3.11
v0.3.12
v0.3.13
v0.3.14
v0.3.2
v0.3.3
v0.3.4
v0.3.5
v0.3.6
v0.3.7
v0.3.8
v0.3.9
v0.3.9-patch-1
v0.3.9-patch-2
v0.4.0
v0.4.1
v0.4.10
v0.4.11
v0.4.12
v0.4.13
v0.4.14
v0.4.15
v0.4.16
v0.4.17
v0.4.2
v0.4.3
v0.4.4
v0.4.5
v0.4.6
v0.4.7
v0.4.8
v0.4.9
v0.5.1
v0.5.2
v0.5.3
v0.5.4

v1.*

v1.0.1
v1.0.2
v1.0.3
v1.0.4
v1.0.4-patch-1