Cross-Site Scripting in FireEye EX, affecting version 9.0.3.936727. Exploitation of this vulnerability allows an attacker to send a specially crafted JavaScript payload via the 'type' and 's_f_name' parameters to an authenticated user to retrieve their session details.

Project Subscriptions

Vendors Products
Fireeye Subscribe
Ex 3500 Subscribe
Ex 3500 Firmware Subscribe
Ex 5500 Subscribe
Ex 5500 Firmwarea Subscribe
Ex 8500 Subscribe
Ex 8500 Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2024-16113 Cross-Site Scripting in FireEye EX, affecting version 9.0.3.936727. Exploitation of this vulnerability allows an attacker to send a specially crafted JavaScript payload via the 'type' and 's_f_name' parameters to an authenticated user to retrieve their session details.
Fixes

Solution

The FireEye team is working on fixing the reported vulnerabilities. It is recommended to update affected products to the latest version available.


Workaround

No workaround given by the vendor.

History

Tue, 03 Jun 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: INCIBE

Published:

Updated: 2025-06-03T13:59:52.149Z

Reserved: 2024-01-08T11:56:03.531Z

Link: CVE-2024-0317

cve-icon Vulnrichment

Updated: 2024-08-01T18:04:48.538Z

cve-icon NVD

Status : Modified

Published: 2024-01-15T17:15:08.850

Modified: 2024-11-21T08:46:18.690

Link: CVE-2024-0317

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses