Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-30879: n/a

0
Medium
VulnerabilityCVE-2024-30879cvecve-2024-30879
Published: Thu Apr 11 2024 (04/11/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Reflected Cross Site Scripting (XSS) vulnerability in RageFrame2 v2.6.43, allows remote attackers to execute arbitrary web scripts or HTML and obtain sensitive information via a crafted payload injected into the boxId parameter in the image cropping function.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 16:46:08 UTC

Technical Analysis

CVE-2024-30879 is a reflected Cross Site Scripting (XSS) vulnerability identified in RageFrame2 version 2.6.43, a web application framework. The vulnerability arises from insufficient sanitization of user-supplied input in the boxId parameter within the image cropping functionality. An attacker can craft a malicious payload that, when injected into this parameter and subsequently reflected in the web page response, executes arbitrary JavaScript or HTML code in the victim's browser. This reflected XSS requires the victim to interact with a maliciously crafted URL or link, which triggers the execution of the injected script. The impact includes potential theft of sensitive information such as cookies or session tokens, enabling session hijacking, or performing actions on behalf of the user. The vulnerability does not require authentication, increasing its risk profile. The CVSS 3.1 base score is 6.1, indicating a medium severity level, with vector metrics AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N, meaning network attack vector, low attack complexity, no privileges required, user interaction required, scope changed, and low confidentiality and integrity impacts with no availability impact. No patches or fixes have been published at the time of disclosure, and no active exploitation has been reported. The vulnerability is classified under CWE-79, a common web application security weakness. Organizations using RageFrame2 should urgently review their input validation and output encoding practices, especially in the image cropping module, to prevent injection of malicious scripts.

Potential Impact

The primary impact of CVE-2024-30879 is the compromise of confidentiality and integrity of user data through reflected XSS attacks. Attackers can steal session cookies, enabling account takeover, or manipulate the victim's interaction with the web application, potentially leading to further exploitation or phishing attacks. Although availability is not affected, the breach of user trust and data confidentiality can have significant reputational and operational consequences. Since no authentication is required, any user visiting a maliciously crafted link is at risk, broadening the attack surface. Organizations relying on RageFrame2 for web applications, especially those handling sensitive user data or financial transactions, face increased risk of data leakage and unauthorized actions. The lack of an available patch increases exposure time, necessitating immediate mitigation. The reflected nature of the XSS limits persistent exploitation but still poses a serious threat to users and organizations. The scope change in the CVSS vector indicates that the vulnerability can affect components beyond the immediate vulnerable function, potentially impacting the entire web application session.

Mitigation Recommendations

1. Implement strict input validation and sanitization on the boxId parameter to ensure only expected values are accepted, rejecting or encoding any special characters that could be used for script injection. 2. Apply proper output encoding (e.g., HTML entity encoding) on all user-supplied data reflected in the web page to prevent execution of injected scripts. 3. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and mitigate the impact of XSS attacks. 4. Educate users and administrators about the risks of clicking untrusted links and encourage cautious behavior. 5. Monitor web application logs for suspicious requests containing unusual or encoded payloads targeting the image cropping function. 6. If possible, isolate or disable the vulnerable image cropping feature until a vendor patch is available. 7. Stay updated with RageFrame2 vendor announcements for official patches or security advisories and apply them promptly once released. 8. Conduct regular security testing, including automated and manual XSS detection, to identify and remediate similar vulnerabilities proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-03-27T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6dcdb7ef31ef0b58ea08

Added to database: 2/25/2026, 9:46:53 PM

Last enriched: 2/26/2026, 4:46:08 PM

Last updated: 4/12/2026, 5:08:37 PM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses