Vulnerability CVE-2024-25976


Published: 2024-05-29

Description:
When LDAP authentication is activated in the configuration it is possible to obtain reflected XSS execution by creating a custom URL that the victim only needs to open in order to execute arbitrary JavaScript code in the victim's browser. This is due to a fault in the file login.php where the content of "$_SERVER['PHP_SELF']" is reflected into the HTML of the website. Hence the attacker does not need a valid account in order to exploit this issue.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
HAWKI 1.0.0-beta.1 XSS / File Overwrite / Session Fixation
Thorger Jansen
29.05.2024

Type:

CWE-79

(Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'))

 References:
https://r.sec-consult.com/hawki
https://github.com/HAWK-Digital-Environments/HAWKI/commit/146967f3148e92d1640ffebc21d8914e2d7fb3f1

Copyright 2024, cxsecurity.com

 

Back to Top