CVE-2020-24602

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2020-24602
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-24602.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2020-24602
Aliases
Published
2020-09-02T15:15:10Z
Modified
2024-09-03T03:22:42.299252Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

Ignite Realtime Openfire 4.5.1 has a reflected Cross-site scripting vulnerability which allows an attacker to execute arbitrary malicious URL via the vulnerable GET parameter searchName", "searchValue", "searchDescription", "searchDefaultValue","searchPlugin", "searchDescription" and "searchDynamic" in the Server Properties and Security Audit Viewer JSP page

References

Affected packages

Git / github.com/igniterealtime/openfire

Affected ranges

Type
GIT
Repo
https://github.com/igniterealtime/openfire
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

Other

attic/origin/master
attic/pubsub_clustering
attic/trunk

v3.*

v3.10.0
v3.9.2
v3.9.3

v4.*

v4.0.0
v4.0.0.beta
v4.1.0
v4.1.0beta
v4.2.0
v4.2.0beta
v4.3.0
v4.3.0beta
v4.4.0
v4.4.0beta
v4.5.0
v4.5.0beta
v4.5.1