{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-8113","assignerOrgId":"655498c3-6ec5-4f0b-aea6-853b334d05a6","state":"PUBLISHED","assignerShortName":"rami.io","dateReserved":"2024-08-23T08:52:05.098Z","datePublished":"2024-08-23T14:18:05.416Z","dateUpdated":"2024-08-30T18:40:02.041Z"},"containers":{"cna":{"affected":[{"collectionURL":"https://pypi.python.org","defaultStatus":"unaffected","packageName":"pretix","product":"pretix","repo":"https://github.com/pretix/pretix","vendor":"pretix","versions":[{"changes":[{"at":"2024.4.1","status":"unaffected"},{"at":"2024.5.1","status":"unaffected"},{"at":"2024.6.1","status":"unaffected"},{"at":"2024.7.1","status":"unaffected"}],"lessThanOrEqual":"2024.7.0","status":"affected","version":"0","versionType":"custom"}]}],"configurations":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Only exploitable if Content-Security-Policy are removed or if a CSP bypass is possible.<br>"}],"value":"Only exploitable if Content-Security-Policy are removed or if a CSP bypass is possible."}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Stored XSS in organizer and event settings of pretix up to 2024.7.0 allows malicious event organizers to inject HTML tags into e-mail previews on settings page. The default Content Security Policy of pretix prevents execution of attacker-provided scripts, making exploitation unlikely. However, combined with a CSP bypass (which is not currently known) the vulnerability could be used to impersonate other organizers or staff users.<br>"}],"value":"Stored XSS in organizer and event settings of pretix up to 2024.7.0 allows malicious event organizers to inject HTML tags into e-mail previews on settings page. The default Content Security Policy of pretix prevents execution of attacker-provided scripts, making exploitation unlikely. However, combined with a CSP bypass (which is not currently known) the vulnerability could be used to impersonate other organizers or staff users."}],"exploits":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"No known exploits.<br>"}],"value":"No known exploits."}],"impacts":[{"capecId":"CAPEC-592","descriptions":[{"lang":"en","value":"CAPEC-592 Stored XSS"}]}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"USER","Safety":"NOT_DEFINED","attackComplexity":"HIGH","attackRequirements":"PRESENT","attackVector":"NETWORK","baseScore":7.2,"baseSeverity":"HIGH","privilegesRequired":"HIGH","providerUrgency":"GREEN","subAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"PASSIVE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/R:U/RE:L/U:Green","version":"4.0","vulnAvailabilityImpact":"NONE","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnerabilityResponseEffort":"LOW"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-79","description":"CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"655498c3-6ec5-4f0b-aea6-853b334d05a6","shortName":"rami.io","dateUpdated":"2024-08-23T14:24:05.228Z"},"references":[{"tags":["release-notes"],"url":"https://pretix.eu/about/en/blog/20240823-release-2024-7-1/"}],"source":{"discovery":"INTERNAL"},"title":"Stored XSS in Placeholder Samples in Mail Preview","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-08-30T18:23:56.592210Z","id":"CVE-2024-8113","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-08-30T18:40:02.041Z"}}]}}