Users who click on a malicious link or visit a website under the control of an attacker can be infected with arbitrary JavaScript which is running in the context of the "Numerix License Server Administration System Login" (nlslogin.jsp) page. The vulnerability can be triggered by sending a specially crafted HTTP POST request. 



The vendor was unresponsive during multiple attempts to contact them via various channels, hence there is no solution available. In case you are using this software, be sure to restrict access and monitor logs. Try to reach out to your contact person for this vendor and request a patch.
Advisories

No advisories yet.

Fixes

Solution

The vendor was unresponsive during multiple attempts to contact them via various channels, hence there is no solution available. In case you are using this software, be sure to restrict access and monitor logs. Try to reach out to your contact person for this vendor and request a patch.


Workaround

No workaround given by the vendor.

History

Thu, 12 Dec 2024 23:45:00 +0000

Type Values Removed Values Added
References

Wed, 11 Dec 2024 19:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 11 Dec 2024 15:15:00 +0000

Type Values Removed Values Added
Description Users who click on a malicious link or visit a website under the control of an attacker can be infected with arbitrary JavaScript which is running in the context of the "Numerix License Server Administration System Login" (nlslogin.jsp) page. The vulnerability can be triggered by sending a specially crafted HTTP POST request.  The vendor was unresponsive during multiple attempts to contact them via various channels, hence there is no solution available. In case you are using this software, be sure to restrict access and monitor logs. Try to reach out to your contact person for this vendor and request a patch.
Title Reflected Cross-Site Scripting
Weaknesses CWE-79
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: SEC-VLab

Published:

Updated: 2024-12-12T23:02:53.412Z

Reserved: 2024-10-25T07:26:12.627Z

Link: CVE-2024-50585

cve-icon Vulnrichment

Updated: 2024-12-12T23:02:53.412Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-12-11T15:15:14.920

Modified: 2024-12-12T23:15:10.643

Link: CVE-2024-50585

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses