HIGHCVE-2024-37166CVSS 8.9

ghtml Cross-Site Scripting (XSS) vulnerability

翻译中…

平台

javascript

组件

ghtml

修复版本

2.0.1

AI Confidence: highNVDEPSS 0.2%已审阅: 2026年5月
正在翻译为您的语言…

CVE-2024-37166 describes a Cross-Site Scripting (XSS) vulnerability within ghtml, a software component utilizing tagged templates for template engine functionality. This vulnerability allows attackers to inject user-controlled JavaScript code, potentially leading to malicious script execution within a user's browser. Versions of ghtml prior to 2.0.0 are affected, while version 2.0.0 introduces changes to mitigate this issue, though it clarifies that comprehensive XSS protection requires developer caution.

影响与攻击场景翻译中…

Successful exploitation of CVE-2024-37166 enables an attacker to inject arbitrary JavaScript code into web pages viewed by other users. This can lead to a variety of malicious outcomes, including session hijacking, defacement of websites, redirection to phishing sites, and theft of sensitive information like cookies and authentication tokens. The impact is particularly severe if the ghtml template engine is used in a high-traffic or sensitive application, as a single successful injection could affect a large number of users. While ghtml escapes characters with special meaning in HTML, it does not provide complete protection against all XSS attack vectors, highlighting the need for developers to implement additional security measures.

利用背景翻译中…

CVE-2024-37166 was published on June 10, 2024. The vulnerability's severity is rated as High (CVSS 8.9). Currently, there are no publicly known active campaigns exploiting this specific vulnerability. While no public Proof-of-Concept (POC) exploits have been widely released, the nature of XSS vulnerabilities means that it is likely a POC will emerge. The vulnerability is not listed on KEV or EPSS, indicating a low to medium probability of exploitation in the short term.

威胁情报

漏洞利用状态

概念验证未知
CISA KEVNO
互联网暴露

EPSS

0.21% (44% 百分位)

CISA SSVC

利用情况none
可自动化no
技术影响total

CVSS 向量

威胁情报· CVSS 3.1CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L8.9HIGHAttack VectorNetwork攻击者如何到达目标Attack ComplexityLow利用漏洞所需的条件Privileges RequiredLow攻击所需的认证级别User InteractionRequired是否需要受害者采取行动ScopeChanged超出受影响组件的影响范围ConfidentialityHigh敏感数据泄露风险IntegrityHigh数据未授权篡改风险AvailabilityLow服务中断风险nextguardhq.com · CVSS v3.1 基础分数
这些指标意味着什么?
Attack Vector
网络 — 可通过互联网远程利用,无需物理或本地访问。攻击面最大。
Attack Complexity
低 — 无需特殊条件,可以稳定地利用漏洞。
Privileges Required
低 — 任何有效用户账户均可。
User Interaction
需要 — 受害者必须打开文件、点击链接或访问特制页面。
Scope
已改变 — 攻击可以超出脆弱组件,影响其他系统。
Confidentiality
高 — 完全丧失机密性,攻击者可读取所有数据。
Integrity
高 — 攻击者可写入、修改或删除任何数据。
Availability
低 — 部分或间歇性拒绝服务。

受影响的软件

组件ghtml
供应商gurgunday
影响范围修复版本
< 2.0.0 – < 2.0.02.0.1

弱点分类 (CWE)

时间线

  1. 已保留
  2. 发布日期
  3. 修改日期
  4. EPSS 更新日期

缓解措施和替代方案翻译中…

The primary mitigation for CVE-2024-37166 is to upgrade to version 2.0.0 of ghtml, which includes changes designed to reduce the risk of XSS vulnerabilities. If immediate upgrading is not feasible, developers should implement robust input validation and output encoding techniques within their applications to sanitize user-provided data before it is rendered by ghtml. Consider using a Web Application Firewall (WAF) with XSS filtering rules to provide an additional layer of defense. Thoroughly review and update any existing ghtml templates to ensure they are not vulnerable to XSS attacks, paying close attention to areas where user-supplied data is incorporated. After upgrading, confirm the mitigation by attempting to inject a simple JavaScript payload into a ghtml template and verifying that it is not executed.

修复方法翻译中…

Actualice la biblioteca ghtml a la versión 2.0.0 o superior. Esta versión incluye mitigaciones contra la vulnerabilidad XSS. Además, revise y sanitice las entradas de usuario para prevenir posibles ataques XSS, ya que la biblioteca no ofrece protección completa en todos los escenarios.

CVE 安全通讯

漏洞分析和关键警报直接发送到您的邮箱。

常见问题翻译中…

What is CVE-2024-37166 — Cross-Site Scripting (XSS) in ghtml?

It's a Cross-Site Scripting (XSS) vulnerability in ghtml, a tagged template engine, allowing attackers to inject JavaScript code.

Am I affected by CVE-2024-37166 in ghtml?

If you are using ghtml versions prior to 2.0.0, you are potentially affected. Assess your applications and templates for vulnerable code.

How do I fix CVE-2024-37166 in ghtml?

Upgrade to ghtml version 2.0.0. If upgrading isn't possible immediately, implement strict input validation and output encoding.

Is CVE-2024-37166 being actively exploited?

Currently, there are no known active campaigns exploiting this specific vulnerability, but XSS vulnerabilities are frequently targeted.

Where can I find the official ghtml advisory for CVE-2024-37166?

Refer to the official ghtml documentation and the NVD entry for CVE-2024-37166 for detailed information.

你的项目受影响吗?

上传你的依赖文件,立即了解此CVE和其他CVE是否影响你。