Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2024-52875

Опубликовано: 31 янв. 2025
Источник: nvd
CVSS3: 8.8
EPSS Высокий

Описание

An issue was discovered in GFI Kerio Control 9.2.5 through 9.4.5. The dest GET parameter passed to the /nonauth/addCertException.cs and /nonauth/guestConfirm.cs and /nonauth/expiration.cs pages is not properly sanitized before being used to generate a Location HTTP header in a 302 HTTP response. This can be exploited to perform Open Redirect or HTTP Response Splitting attacks, which in turn lead to Reflected Cross-Site Scripting (XSS). Remote command execution can be achieved by leveraging the upgrade feature in the admin interface.

Ссылки

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:gfi:kerio_control:*:*:*:*:*:*:*:*
Версия от 9.2.5 (включая) до 9.4.5 (включая)

EPSS

Процентиль: 99%
0.78566
Высокий

8.8 High

CVSS3

Дефекты

CWE-113

Связанные уязвимости

CVSS3: 8.8
github
около 1 года назад

An issue was discovered in GFI Kerio Control 9.2.5 through 9.4.5. The dest GET parameter passed to the /nonauth/addCertException.cs and /nonauth/guestConfirm.cs and /nonauth/expiration.cs pages is not properly sanitized before being used to generate a Location HTTP header in a 302 HTTP response. This can be exploited to perform Open Redirect or HTTP Response Splitting attacks, which in turn lead to Reflected Cross-Site Scripting (XSS). Remote command execution can be achieved by leveraging the upgrade feature in the admin interface.

CVSS3: 8.8
fstec
около 1 года назад

Уязвимость программного средства межсетевого экранирования Kerio Control, связанная с непринятием мер по нейтрализации специальных элементов, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 99%
0.78566
Высокий

8.8 High

CVSS3

Дефекты

CWE-113