CVE-2024-56517

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-56517
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-56517.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-56517
Aliases
Published
2024-12-30T17:15:09Z
Modified
2025-01-15T05:16:53.066631Z
Summary
[none]
Details

LGSL (Live Game Server List) provides online status lists for online video games. Versions up to and including 6.2.1 contain a reflected cross-site scripting vulnerability in the Referer HTTP header. The vulnerability allows attackers to inject arbitrary JavaScript code, which is reflected in the HTML response without proper sanitization. When crafted malicious input is provided in the Referer header, it is echoed back into an HTML attribute in the application’s response. Commit 7ecb839df9358d21f64cdbff5b2536af25a77de1 contains a patch for the issue.

References

Affected packages

Git / github.com/tltneon/lgsl

Affected ranges

Type
GIT
Repo
https://github.com/tltneon/lgsl
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v5.*

v5.10.0
v5.10.1
v5.10.2
v5.10.3
v5.8
v5.8_php7
v5.9.2
v5.9.3
v5.9.4
v5.9.6

v6.*

v6.0.0
v6.0.1
v6.1.0
v6.1.1
v6.2.0
v6.2.1