FKIE_CVE-2024-11986
Vulnerability from fkie_nvd - Published: 2024-12-13 14:15 - Updated: 2024-12-13 14:15
Severity ?
Summary
Improper input handling in the 'Host Header' allows an unauthenticated attacker to store a payload in web application logs. When an Administrator views the logs using the application's standard functionality, it enables the execution of the payload, resulting in Stored XSS or 'Cross-Site Scripting'.
References
Impacted products
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper input handling in the \u0027Host Header\u0027 allows an unauthenticated attacker to store a payload in web application logs. When an Administrator views the logs using the application\u0027s standard functionality, it enables the execution of the payload, resulting in Stored XSS or \u0027Cross-Site Scripting\u0027."
},
{
"lang": "es",
"value": "El manejo inadecuado de la entrada en el \u0027Host Header\u0027 permite que un atacante no autenticado almacene un payload en los registros de la aplicaci\u00f3n web. Cuando un administrador ve los registros mediante la funcionalidad est\u00e1ndar de la aplicaci\u00f3n, permite la ejecuci\u00f3n de el payload, lo que da como resultado XSS almacenado o \u0027Cross-Site Scripting\u0027."
}
],
"id": "CVE-2024-11986",
"lastModified": "2024-12-13T14:15:21.207",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 6.0,
"source": "a6d3dc9e-0591-4a13-bce7-0f5b31ff6158",
"type": "Secondary"
}
]
},
"published": "2024-12-13T14:15:21.207",
"references": [
{
"source": "a6d3dc9e-0591-4a13-bce7-0f5b31ff6158",
"url": "https://crushftp.com/crush11wiki/Wiki.jsp?page=Update"
}
],
"sourceIdentifier": "a6d3dc9e-0591-4a13-bce7-0f5b31ff6158",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "a6d3dc9e-0591-4a13-bce7-0f5b31ff6158",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…