Vulnerability Description
When LDAP authentication is activated in the configuration it is possible to obtain reflected XSS execution by creating a custom URL that the victim only needs to open in order to execute arbitrary JavaScript code in the victim's browser. This is due to a fault in the file login.php where the content of "$_SERVER['PHP_SELF']" is reflected into the HTML of the website. Hence the attacker does not need a valid account in order to exploit this issue.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- http://seclists.org/fulldisclosure/2024/May/34
- https://github.com/HAWK-Digital-Environments/HAWKI/commit/146967f3148e92d1640ffe
- https://r.sec-consult.com/hawki
- http://seclists.org/fulldisclosure/2024/May/34
- https://github.com/HAWK-Digital-Environments/HAWKI/commit/146967f3148e92d1640ffe
- https://r.sec-consult.com/hawki
FAQ
What is CVE-2024-25976?
CVE-2024-25976 is a vulnerability with a CVSS score of 6.1 (MEDIUM). When LDAP authentication is activated in the configuration it is possible to obtain reflected XSS execution by creating a custom URL that the victim only needs to open in order to execute arbitrary Ja...
How severe is CVE-2024-25976?
CVE-2024-25976 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-25976?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.