### [CVE-2024-12020](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12020) ![](https://img.shields.io/static/v1?label=Product&message=LogicalDOC%20Enterprise&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20'Cross-site%20Scripting')&color=brightgreen) ### Description There is a reflected cross-site scripting (XSS) within JSP files used to control application appearance. An unauthenticated attacker could deceive a user into clicking a crafted link to trigger the vulnerability. Stealing the session cookie is not possible due to cookie security flags, however the XSS may be used to induce a victim to perform on-site requests without their knowledge.This vulnerability only affects LogicalDOC Enterprise. ### POC #### Reference - https://www.blackduck.com/blog/cyrc-advisory-logicaldoc.html #### Github No PoCs found on GitHub currently.