CVE-2024-11986 (GCVE-0-2024-11986)
Vulnerability from cvelistv5 – Published: 2024-12-13 13:46 – Updated: 2024-12-13 20:41
VLAI?
Summary
Improper input handling in the 'Host Header' allows an unauthenticated attacker to store a payload in web application logs. When an Administrator views the logs using the application's standard functionality, it enables the execution of the payload, resulting in Stored XSS or 'Cross-Site Scripting'.
Severity ?
9.6 (Critical)
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| CrushFTP, LLC | CrushFTP |
Affected:
10.0.0 , < 10.8.2
(semver)
Affected: 11.0.0 , < 11.2.1 (semver) |
Credits
European Commission, Application Security Testing Services
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-11986",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-12-13T20:41:08.250727Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-12-13T20:41:28.545Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"platforms": [
"Windows"
],
"product": "CrushFTP",
"vendor": "CrushFTP, LLC",
"versions": [
{
"lessThan": "10.8.2",
"status": "affected",
"version": "10.0.0",
"versionType": "semver"
},
{
"lessThan": "11.2.1",
"status": "affected",
"version": "11.0.0",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "European Commission, Application Security Testing Services"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgba(63, 67, 80, 0.04);\"\u003eImproper input handling in the \u0027Host Header\u0027 allows an unauthenticated attacker to store a payload in web application logs. When an Administrator views the logs using the application\u0027s standard functionality, it enables the execution of the payload, resulting in Stored XSS or \u0027Cross-Site Scripting\u0027.\u003c/span\u003e\n\n\u003cbr\u003e"
}
],
"value": "Improper input handling in the \u0027Host Header\u0027 allows an unauthenticated attacker to store a payload in web application logs. When an Administrator views the logs using the application\u0027s standard functionality, it enables the execution of the payload, resulting in Stored XSS or \u0027Cross-Site Scripting\u0027."
}
],
"impacts": [
{
"capecId": "CAPEC-592",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-592 Stored XSS"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-13T13:46:54.204Z",
"orgId": "a6d3dc9e-0591-4a13-bce7-0f5b31ff6158",
"shortName": "ENISA"
},
"references": [
{
"url": "https://crushftp.com/crush11wiki/Wiki.jsp?page=Update"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Stored XSS in CrushFTP",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "a6d3dc9e-0591-4a13-bce7-0f5b31ff6158",
"assignerShortName": "ENISA",
"cveId": "CVE-2024-11986",
"datePublished": "2024-12-13T13:46:54.204Z",
"dateReserved": "2024-11-29T07:20:34.286Z",
"dateUpdated": "2024-12-13T20:41:28.545Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"descriptions": "[{\"lang\": \"en\", \"value\": \"Improper input handling in the \u0027Host Header\u0027 allows an unauthenticated attacker to store a payload in web application logs. When an Administrator views the logs using the application\u0027s standard functionality, it enables the execution of the payload, resulting in Stored XSS or \u0027Cross-Site Scripting\u0027.\"}, {\"lang\": \"es\", \"value\": \"El manejo inadecuado de la entrada en el \u0027Host Header\u0027 permite que un atacante no autenticado almacene un payload en los registros de la aplicaci\\u00f3n web. Cuando un administrador ve los registros mediante la funcionalidad est\\u00e1ndar de la aplicaci\\u00f3n, permite la ejecuci\\u00f3n de el payload, lo que da como resultado XSS almacenado o \u0027Cross-Site Scripting\u0027.\"}]",
"id": "CVE-2024-11986",
"lastModified": "2024-12-13T14:15:21.207",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"a6d3dc9e-0591-4a13-bce7-0f5b31ff6158\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H\", \"baseScore\": 9.6, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 6.0}]}",
"published": "2024-12-13T14:15:21.207",
"references": "[{\"url\": \"https://crushftp.com/crush11wiki/Wiki.jsp?page=Update\", \"source\": \"a6d3dc9e-0591-4a13-bce7-0f5b31ff6158\"}]",
"sourceIdentifier": "a6d3dc9e-0591-4a13-bce7-0f5b31ff6158",
"vulnStatus": "Awaiting Analysis",
"weaknesses": "[{\"source\": \"a6d3dc9e-0591-4a13-bce7-0f5b31ff6158\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-79\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-11986\",\"sourceIdentifier\":\"a6d3dc9e-0591-4a13-bce7-0f5b31ff6158\",\"published\":\"2024-12-13T14:15:21.207\",\"lastModified\":\"2024-12-13T14:15:21.207\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Improper input handling in the \u0027Host Header\u0027 allows an unauthenticated attacker to store a payload in web application logs. When an Administrator views the logs using the application\u0027s standard functionality, it enables the execution of the payload, resulting in Stored XSS or \u0027Cross-Site Scripting\u0027.\"},{\"lang\":\"es\",\"value\":\"El manejo inadecuado de la entrada en el \u0027Host Header\u0027 permite que un atacante no autenticado almacene un payload en los registros de la aplicaci\u00f3n web. Cuando un administrador ve los registros mediante la funcionalidad est\u00e1ndar de la aplicaci\u00f3n, permite la ejecuci\u00f3n de el payload, lo que da como resultado XSS almacenado o \u0027Cross-Site Scripting\u0027.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"a6d3dc9e-0591-4a13-bce7-0f5b31ff6158\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H\",\"baseScore\":9.6,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":6.0}]},\"weaknesses\":[{\"source\":\"a6d3dc9e-0591-4a13-bce7-0f5b31ff6158\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"references\":[{\"url\":\"https://crushftp.com/crush11wiki/Wiki.jsp?page=Update\",\"source\":\"a6d3dc9e-0591-4a13-bce7-0f5b31ff6158\"}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…