CVE-2024-25976 Vulnerability Details

  /     /     /  

CVE-2024-25976 Metadata Quick Info

CVE Published: 29/05/2024 | CVE Updated: 01/08/2024 | CVE Year: 2024
Source: SEC-VLab | Vendor: Interaction Design Team at the University of Applied Sciences and Arts in Hildesheim/Germany | Product: HAWKI
Status : PUBLISHED

CVE-2024-25976 Description

When LDAP authentication is activated in the configuration it is possible to obtain reflected XSS execution by creating a custom URL that the victim only needs to open in order to execute arbitrary JavaScript code in the victim\'s browser. This is due to a fault in the file login.php where the content of "$_SERVER[\'PHP_SELF\']" is reflected into the HTML of the website. Hence the attacker does not need a valid account in order to exploit this issue.

Metrics

CVSS Version: 3.1 | Base Score: n/a
Vector: n/a

l➤ Exploitability Metrics:
    Attack Vector (AV)*
    Attack Complexity (AC)*
    Privileges Required (PR)*
    User Interaction (UI)*
    Scope (S)*

l➤ Impact Metrics:
    Confidentiality Impact (C)*
    Integrity Impact (I)*
    Availability Impact (A)*

Weakness Enumeration (CWE)

CWE-ID: CWE-79
CWE Name: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or Cross-site Scripting )
Source: Interaction Design Team at the University of Applied Sciences and Arts in Hildesheim/Germany

Common Attack Pattern Enumeration and Classification (CAPEC)

CAPEC-ID: CAPEC-63
CAPEC Description: CAPEC-63 Cross-Site Scripting (XSS)


Source: NVD (National Vulnerability Database).