{"id":"GO-2024-2721","summary":"Cross site scripting in github.com/tiagorlampert/CHAOS","details":"A malicious actor may be able to extract a JWT token via malicious \"/command\" request. This is a form of cross site scripting (XSS).","aliases":["CVE-2024-31839","GHSA-c5rv-hjjc-jv7m"],"modified":"2024-05-20T16:03:47Z","published":"2024-05-09T22:01:10Z","database_specific":{"url":"https://pkg.go.dev/vuln/GO-2024-2721","review_status":"REVIEWED"},"references":[{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-31839"},{"type":"WEB","url":"https://blog.chebuya.com/posts/remote-code-execution-on-chaos-rat-via-spoofed-agents"}],"affected":[{"package":{"name":"github.com/tiagorlampert/CHAOS","ecosystem":"Go","purl":"pkg:golang/github.com/tiagorlampert/CHAOS"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"}]}],"ecosystem_specific":{"imports":[{"path":"github.com/tiagorlampert/CHAOS/presentation/http","symbols":["NewServer","httpController.sendCommandHandler"]}]},"database_specific":{"source":"https://vuln.go.dev/ID/GO-2024-2721.json"}}],"schema_version":"1.7.3"}