When LDAP authentication is activated in the configuration it is possible to obtain reflected XSS execution by creating a custom URL that the victim only needs to open in order to execute arbitrary JavaScript code in the victim's browser. This is due to a fault in the file login.php where the content of "$_SERVER['PHP_SELF']" is reflected into the HTML of the website. Hence the attacker does not need a valid account in order to exploit this issue.
CVSS
No CVSS.
References
Configurations
No configuration.
History
21 Nov 2024, 09:01
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/fulldisclosure/2024/May/34 - | |
References | () https://github.com/HAWK-Digital-Environments/HAWKI/commit/146967f3148e92d1640ffebc21d8914e2d7fb3f1 - | |
References | () https://r.sec-consult.com/hawki - |
10 Jun 2024, 17:16
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References |
|
29 May 2024, 13:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-29 13:15
Updated : 2024-11-21 09:01
NVD link : CVE-2024-25976
Mitre link : CVE-2024-25976
CVE.ORG link : CVE-2024-25976
JSON object : View
Products Affected
No product.
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')