CVE-2024-28237:
XSS via the "Snapshot Test" feature in Classic Webcam plugin settings
4
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.50568%
CWE
Published
3/18/2024
Updated
1/21/2025
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
OctoPrint | pip | <= 1.9.3 | 1.10.0rc3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from how the snapshot test response was handled in the Classic Webcam plugin's JavaScript. The pre-patch code directly interpolated the server-provided Content-Type into an HTML string via concatenation ($('<p>...</p><img src="data:' + mimeType + ... >')). This unsafe practice allowed XSS when an attacker provided a Content-Type containing HTML event handlers. The patched version fixes this by using safe DOM construction methods (jQuery's .attr() and .text()), eliminating HTML string injection vectors.