CVE-2024-41504
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-06-10

Last updated on: 2025-10-01

Assigner: MITRE

Description
Jetimob Plataforma Imobiliaria 20240627-0 is vulnerable to Cross Site Scripting (XSS). In the "Oportunidades" (opportunities) section of the application when creating or editing an "Atividade" (activity), the form field "Descrico" allows injection of JavaScript.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-06-10
Last Modified
2025-10-01
Generated
2026-05-07
AI Q&A
2025-06-10
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
jetimob imobiliaria 2024-06-27
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2024-41504 is a Stored Cross-Site Scripting (XSS) vulnerability in Jetimob Plataforma Imobiliaria version 20240627-0. It occurs in the "Oportunidades" section when creating or editing an "Atividade" (activity). The "DescriΓ§Γ£o" (description) form field does not properly sanitize input, allowing attackers to inject malicious JavaScript code. This code is then executed whenever the affected activity is viewed, enabling persistent script injection. [2]


How can this vulnerability impact me? :

This vulnerability can allow attackers to execute malicious JavaScript in the context of the affected application. This can lead to theft of user session cookies, unauthorized actions performed on behalf of users, and potential compromise of user data and sessions. Persistent script injection means the malicious code remains stored and executes every time the affected activity is accessed, increasing the risk and impact. [2]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by testing the 'DescriΓ§Γ£o' field in the 'Oportunidades' section of the Jetimob Plataforma Imobiliaria version 20240627-0 for stored Cross-Site Scripting (XSS). You can attempt to inject a test payload such as `<img src=x onerror=alert(document.cookie)>` into the 'DescriΓ§Γ£o' field when creating or editing an 'Atividade'. If the payload executes (e.g., an alert box appears when viewing the activity), the vulnerability is present. There are no specific network commands provided, but manual testing through the application interface or automated web vulnerability scanners that test for stored XSS can be used. [2]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include avoiding the use of the vulnerable version 20240627-0 of Jetimob Plataforma Imobiliaria until a patch is available. If possible, restrict access to the 'Oportunidades' section or the 'DescriΓ§Γ£o' input field to trusted users only. Additionally, implement input sanitization or filtering on the 'DescriΓ§Γ£o' field to block JavaScript code injection. Using web application firewalls (WAFs) to detect and block XSS payloads can also help reduce risk until an official fix is released. [2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart