mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
57 lines
2.4 KiB
JSON
57 lines
2.4 KiB
JSON
{
|
|
"id": "CVE-2024-25976",
|
|
"sourceIdentifier": "551230f0-3615-47bd-b7cc-93e92e730bbf",
|
|
"published": "2024-05-29T13:15:49.563",
|
|
"lastModified": "2024-11-21T09:01:41.313",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "When LDAP authentication is activated in the configuration it is possible to obtain reflected XSS execution by creating a custom URL that the victim only needs to open in order to execute arbitrary JavaScript code in the victim's browser. This is due to a fault in the file login.php where the content of \"$_SERVER['PHP_SELF']\" is reflected into the HTML of the website. Hence the attacker does not need a valid account in order to exploit this issue."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Cuando la autenticaci\u00f3n LDAP est\u00e1 activada en la configuraci\u00f3n, es posible obtener la ejecuci\u00f3n XSS reflejado creando una URL personalizada que la v\u00edctima solo necesita abrir para ejecutar c\u00f3digo JavaScript arbitrario en el navegador de la v\u00edctima. Esto se debe a un fallo en el archivo login.php donde el contenido de \"$_SERVER['PHP_SELF']\" se refleja en el HTML del sitio web. Por lo tanto, el atacante no necesita una cuenta v\u00e1lida para aprovechar este problema."
|
|
}
|
|
],
|
|
"metrics": {},
|
|
"weaknesses": [
|
|
{
|
|
"source": "551230f0-3615-47bd-b7cc-93e92e730bbf",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-79"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://seclists.org/fulldisclosure/2024/May/34",
|
|
"source": "551230f0-3615-47bd-b7cc-93e92e730bbf"
|
|
},
|
|
{
|
|
"url": "https://github.com/HAWK-Digital-Environments/HAWKI/commit/146967f3148e92d1640ffebc21d8914e2d7fb3f1",
|
|
"source": "551230f0-3615-47bd-b7cc-93e92e730bbf"
|
|
},
|
|
{
|
|
"url": "https://r.sec-consult.com/hawki",
|
|
"source": "551230f0-3615-47bd-b7cc-93e92e730bbf"
|
|
},
|
|
{
|
|
"url": "http://seclists.org/fulldisclosure/2024/May/34",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "https://github.com/HAWK-Digital-Environments/HAWKI/commit/146967f3148e92d1640ffebc21d8914e2d7fb3f1",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "https://r.sec-consult.com/hawki",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
}
|
|
]
|
|
} |