Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-23278 | When LDAP authentication is activated in the configuration it is possible to obtain reflected XSS execution by creating a custom URL that the victim only needs to open in order to execute arbitrary JavaScript code in the victim's browser. This is due to a fault in the file login.php where the content of "$_SERVER['PHP_SELF']" is reflected into the HTML of the website. Hence the attacker does not need a valid account in order to exploit this issue. |
Solution
The vendor provides a patch which can be downloaded from https://github.com/HAWK-Digital-Environments/HAWKI/commit/146967f3148e92d1640ffebc21d8914e2d7fb3f1
Workaround
No workaround given by the vendor.
Mon, 17 Mar 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Thu, 13 Feb 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: SEC-VLab
Published:
Updated: 2025-03-17T20:39:15.968Z
Reserved: 2024-02-13T09:28:28.810Z
Link: CVE-2024-25976
Updated: 2024-08-01T23:52:06.357Z
Status : Awaiting Analysis
Published: 2024-05-29T13:15:49.563
Modified: 2025-03-17T21:15:13.083
Link: CVE-2024-25976
No data.
OpenCVE Enrichment
No data.
EUVD