{ "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", "CVE_data_meta": { "ID": "CVE-2024-56517", "ASSIGNER": "security-advisories@github.com", "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", "value": "LGSL (Live Game Server List) provides online status lists for online video games. Versions up to and including 6.2.1 contain a reflected cross-site scripting vulnerability in the `Referer` HTTP header. The vulnerability allows attackers to inject arbitrary JavaScript code, which is reflected in the HTML response without proper sanitization. When crafted malicious input is provided in the `Referer` header, it is echoed back into an HTML attribute in the application\u2019s response. Commit 7ecb839df9358d21f64cdbff5b2536af25a77de1 contains a patch for the issue." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", "cweId": "CWE-79" } ] } ] }, "affects": { "vendor": { "vendor_data": [ { "vendor_name": "tltneon", "product": { "product_data": [ { "product_name": "lgsl", "version": { "version_data": [ { "version_affected": "=", "version_value": "<= 6.2.1" } ] } } ] } } ] } }, "references": { "reference_data": [ { "url": "https://github.com/tltneon/lgsl/security/advisories/GHSA-ggwq-xc72-33r3", "refsource": "MISC", "name": "https://github.com/tltneon/lgsl/security/advisories/GHSA-ggwq-xc72-33r3" }, { "url": "https://github.com/tltneon/lgsl/commit/7ecb839df9358d21f64cdbff5b2536af25a77de1", "refsource": "MISC", "name": "https://github.com/tltneon/lgsl/commit/7ecb839df9358d21f64cdbff5b2536af25a77de1" }, { "url": "https://github.com/tltneon/lgsl/blob/master/lgsl_files/lgsl_list.php#L20-L24", "refsource": "MISC", "name": "https://github.com/tltneon/lgsl/blob/master/lgsl_files/lgsl_list.php#L20-L24" } ] }, "source": { "advisory": "GHSA-ggwq-xc72-33r3", "discovery": "UNKNOWN" } }