CVE-2024-41805 (GCVE-0-2024-41805)

Vulnerability from cvelistv5 – Published: 2024-07-26 14:51 – Updated: 2024-08-02 04:46
VLAI?
Title
Tracks vulnerable to reflected cross-site scripting
Summary
Tracks, a Getting Things Done (GTD) web application, is vulnerable to reflected cross-site scripting in versions prior to 2.7.1. Reflected cross-site scripting enables execution of malicious JavaScript in the context of a user’s browser if that user clicks on a malicious link, allowing phishing attacks that could lead to credential theft. Tracks version 2.7.1 is patched. No known complete workarounds are available.
CWE
  • CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Assigner
Impacted products
Vendor Product Version
TracksApp tracks Affected: < 2.7.1
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:tracksapp:tracks:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "tracks",
            "vendor": "tracksapp",
            "versions": [
              {
                "status": "affected",
                "version": "2.7.1"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-41805",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-07-26T17:39:46.403498Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-07-26T17:45:20.763Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T04:46:52.945Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "https://github.com/TracksApp/tracks/security/advisories/GHSA-fp4p-59hr-3695",
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/TracksApp/tracks/security/advisories/GHSA-fp4p-59hr-3695"
          },
          {
            "name": "https://github.com/TracksApp/tracks/commit/b0d288d2efd0f8020d04ca95b8e0738a9eab6c51",
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/TracksApp/tracks/commit/b0d288d2efd0f8020d04ca95b8e0738a9eab6c51"
          },
          {
            "name": "https://github.com/TracksApp/tracks/commit/c23ca0574ec1149993476632ffd66643aec6aac2",
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/TracksApp/tracks/commit/c23ca0574ec1149993476632ffd66643aec6aac2"
          },
          {
            "name": "https://github.com/TracksApp/tracks/releases/tag/v2.7.1",
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/TracksApp/tracks/releases/tag/v2.7.1"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "tracks",
          "vendor": "TracksApp",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c 2.7.1"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Tracks, a Getting Things Done (GTD) web application, is vulnerable to reflected cross-site scripting in versions prior to 2.7.1. Reflected cross-site scripting enables execution of malicious JavaScript in the context of a user\u2019s browser if that user clicks on a malicious link, allowing phishing attacks that could lead to credential theft. Tracks version 2.7.1 is patched. No known complete workarounds are available."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-07-26T14:51:16.205Z",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "name": "https://github.com/TracksApp/tracks/security/advisories/GHSA-fp4p-59hr-3695",
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/TracksApp/tracks/security/advisories/GHSA-fp4p-59hr-3695"
        },
        {
          "name": "https://github.com/TracksApp/tracks/commit/b0d288d2efd0f8020d04ca95b8e0738a9eab6c51",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/TracksApp/tracks/commit/b0d288d2efd0f8020d04ca95b8e0738a9eab6c51"
        },
        {
          "name": "https://github.com/TracksApp/tracks/commit/c23ca0574ec1149993476632ffd66643aec6aac2",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/TracksApp/tracks/commit/c23ca0574ec1149993476632ffd66643aec6aac2"
        },
        {
          "name": "https://github.com/TracksApp/tracks/releases/tag/v2.7.1",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/TracksApp/tracks/releases/tag/v2.7.1"
        }
      ],
      "source": {
        "advisory": "GHSA-fp4p-59hr-3695",
        "discovery": "UNKNOWN"
      },
      "title": "Tracks vulnerable to reflected cross-site scripting"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2024-41805",
    "datePublished": "2024-07-26T14:51:02.015Z",
    "dateReserved": "2024-07-22T13:57:37.135Z",
    "dateUpdated": "2024-08-02T04:46:52.945Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "epss": {
      "cve": "CVE-2024-41805",
      "date": "2026-05-06",
      "epss": "0.00523",
      "percentile": "0.6695"
    },
    "fkie_nvd": {
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Tracks, a Getting Things Done (GTD) web application, is vulnerable to reflected cross-site scripting in versions prior to 2.7.1. Reflected cross-site scripting enables execution of malicious JavaScript in the context of a user\\u2019s browser if that user clicks on a malicious link, allowing phishing attacks that could lead to credential theft. Tracks version 2.7.1 is patched. No known complete workarounds are available.\"}, {\"lang\": \"es\", \"value\": \"Tracks, una aplicaci\\u00f3n web Getting Things Done (GTD), es vulnerable a Cross Site Scripting reflejado en versiones anteriores a la 2.7.1. El Cross Site Scripting reflejado permite la ejecuci\\u00f3n de JavaScript malicioso en el contexto del navegador de un usuario si ese usuario hace clic en un enlace malicioso, lo que permite ataques de phishing que podr\\u00edan conducir al robo de credenciales. La versi\\u00f3n 2.7.1 de Tracks est\\u00e1 parcheada. No se conocen soluciones completas disponibles.\"}]",
      "id": "CVE-2024-41805",
      "lastModified": "2024-11-21T09:33:06.590",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"security-advisories@github.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\", \"baseScore\": 6.1, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 2.7}]}",
      "published": "2024-07-26T15:15:11.327",
      "references": "[{\"url\": \"https://github.com/TracksApp/tracks/commit/b0d288d2efd0f8020d04ca95b8e0738a9eab6c51\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"https://github.com/TracksApp/tracks/commit/c23ca0574ec1149993476632ffd66643aec6aac2\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"https://github.com/TracksApp/tracks/releases/tag/v2.7.1\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"https://github.com/TracksApp/tracks/security/advisories/GHSA-fp4p-59hr-3695\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"https://github.com/TracksApp/tracks/commit/b0d288d2efd0f8020d04ca95b8e0738a9eab6c51\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://github.com/TracksApp/tracks/commit/c23ca0574ec1149993476632ffd66643aec6aac2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://github.com/TracksApp/tracks/releases/tag/v2.7.1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://github.com/TracksApp/tracks/security/advisories/GHSA-fp4p-59hr-3695\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "security-advisories@github.com",
      "vulnStatus": "Awaiting Analysis",
      "weaknesses": "[{\"source\": \"security-advisories@github.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-79\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-41805\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2024-07-26T15:15:11.327\",\"lastModified\":\"2024-11-21T09:33:06.590\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Tracks, a Getting Things Done (GTD) web application, is vulnerable to reflected cross-site scripting in versions prior to 2.7.1. Reflected cross-site scripting enables execution of malicious JavaScript in the context of a user\u2019s browser if that user clicks on a malicious link, allowing phishing attacks that could lead to credential theft. Tracks version 2.7.1 is patched. No known complete workarounds are available.\"},{\"lang\":\"es\",\"value\":\"Tracks, una aplicaci\u00f3n web Getting Things Done (GTD), es vulnerable a Cross Site Scripting reflejado en versiones anteriores a la 2.7.1. El Cross Site Scripting reflejado permite la ejecuci\u00f3n de JavaScript malicioso en el contexto del navegador de un usuario si ese usuario hace clic en un enlace malicioso, lo que permite ataques de phishing que podr\u00edan conducir al robo de credenciales. La versi\u00f3n 2.7.1 de Tracks est\u00e1 parcheada. No se conocen soluciones completas disponibles.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\",\"baseScore\":6.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":2.7}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"references\":[{\"url\":\"https://github.com/TracksApp/tracks/commit/b0d288d2efd0f8020d04ca95b8e0738a9eab6c51\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/TracksApp/tracks/commit/c23ca0574ec1149993476632ffd66643aec6aac2\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/TracksApp/tracks/releases/tag/v2.7.1\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/TracksApp/tracks/security/advisories/GHSA-fp4p-59hr-3695\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/TracksApp/tracks/commit/b0d288d2efd0f8020d04ca95b8e0738a9eab6c51\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/TracksApp/tracks/commit/c23ca0574ec1149993476632ffd66643aec6aac2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/TracksApp/tracks/releases/tag/v2.7.1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/TracksApp/tracks/security/advisories/GHSA-fp4p-59hr-3695\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://github.com/TracksApp/tracks/security/advisories/GHSA-fp4p-59hr-3695\", \"name\": \"https://github.com/TracksApp/tracks/security/advisories/GHSA-fp4p-59hr-3695\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://github.com/TracksApp/tracks/commit/b0d288d2efd0f8020d04ca95b8e0738a9eab6c51\", \"name\": \"https://github.com/TracksApp/tracks/commit/b0d288d2efd0f8020d04ca95b8e0738a9eab6c51\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://github.com/TracksApp/tracks/commit/c23ca0574ec1149993476632ffd66643aec6aac2\", \"name\": \"https://github.com/TracksApp/tracks/commit/c23ca0574ec1149993476632ffd66643aec6aac2\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://github.com/TracksApp/tracks/releases/tag/v2.7.1\", \"name\": \"https://github.com/TracksApp/tracks/releases/tag/v2.7.1\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T04:46:52.945Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-41805\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-07-26T17:39:46.403498Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:tracksapp:tracks:*:*:*:*:*:*:*:*\"], \"vendor\": \"tracksapp\", \"product\": \"tracks\", \"versions\": [{\"status\": \"affected\", \"version\": \"2.7.1\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-07-26T17:45:13.460Z\"}}], \"cna\": {\"title\": \"Tracks vulnerable to reflected cross-site scripting\", \"source\": {\"advisory\": \"GHSA-fp4p-59hr-3695\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 6.1, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"LOW\"}}], \"affected\": [{\"vendor\": \"TracksApp\", \"product\": \"tracks\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003c 2.7.1\"}]}], \"references\": [{\"url\": \"https://github.com/TracksApp/tracks/security/advisories/GHSA-fp4p-59hr-3695\", \"name\": \"https://github.com/TracksApp/tracks/security/advisories/GHSA-fp4p-59hr-3695\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://github.com/TracksApp/tracks/commit/b0d288d2efd0f8020d04ca95b8e0738a9eab6c51\", \"name\": \"https://github.com/TracksApp/tracks/commit/b0d288d2efd0f8020d04ca95b8e0738a9eab6c51\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/TracksApp/tracks/commit/c23ca0574ec1149993476632ffd66643aec6aac2\", \"name\": \"https://github.com/TracksApp/tracks/commit/c23ca0574ec1149993476632ffd66643aec6aac2\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/TracksApp/tracks/releases/tag/v2.7.1\", \"name\": \"https://github.com/TracksApp/tracks/releases/tag/v2.7.1\", \"tags\": [\"x_refsource_MISC\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Tracks, a Getting Things Done (GTD) web application, is vulnerable to reflected cross-site scripting in versions prior to 2.7.1. Reflected cross-site scripting enables execution of malicious JavaScript in the context of a user\\u2019s browser if that user clicks on a malicious link, allowing phishing attacks that could lead to credential theft. Tracks version 2.7.1 is patched. No known complete workarounds are available.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-79\", \"description\": \"CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2024-07-26T14:51:16.205Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-41805\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-08-02T04:46:52.945Z\", \"dateReserved\": \"2024-07-22T13:57:37.135Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2024-07-26T14:51:02.015Z\", \"assignerShortName\": \"GitHub_M\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.

Sightings

Author Source Type Date Other

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…