Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2024-25976 | First vendor Publication | 2024-05-29 |
Vendor | Cve | Last vendor Modification | 2025-03-17 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : | |||
---|---|---|---|
Cvss Base Score | N/A | Attack Range | N/A |
Cvss Impact Score | N/A | Attack Complexity | N/A |
Cvss Expoit Score | N/A | Authentication | N/A |
Calculate full CVSS 2.0 Vectors scores |
Detail
When LDAP authentication is activated in the configuration it is possible to obtain reflected XSS execution by creating a custom URL that the victim only needs to open in order to execute arbitrary JavaScript code in the victim's browser. This is due to a fault in the file login.php where the content of "$_SERVER['PHP_SELF']" is reflected into the HTML of the website. Hence the attacker does not need a valid account in order to exploit this issue. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25976 |
Sources (Detail)
Source | Url |
---|
Alert History
Date | Informations |
---|---|
2025-03-18 00:21:36 |
|
2024-11-25 09:25:18 |
|
2024-06-10 21:27:27 |
|
2024-05-29 21:27:27 |
|
2024-05-29 17:27:27 |
|