First published: Wed Sep 02 2020(Updated: )
Ignite Realtime Openfire 4.5.1 has a reflected Cross-site scripting vulnerability which allows an attacker to execute arbitrary malicious URL via the vulnerable GET parameter searchName", "searchValue", "searchDescription", "searchDefaultValue","searchPlugin", "searchDescription" and "searchDynamic" in the Server Properties and Security Audit Viewer JSP page
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Igniterealtime Openfire | =4.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-24602 is a reflected Cross-site scripting vulnerability in Ignite Realtime Openfire 4.5.1, allowing an attacker to execute arbitrary malicious URLs through certain GET parameters.
An attacker can exploit the CVE-2020-24602 vulnerability by injecting malicious code into the 'searchName', 'searchValue', 'searchDescription', 'searchDefaultValue', 'searchPlugin', 'searchDescription', or 'searchDynamic' parameters.
CVE-2020-24602 has a severity rating of 6.1, which is considered medium.
CVE-2020-24602 affects Ignite Realtime Openfire version 4.5.1.
To fix the CVE-2020-24602 vulnerability, it is recommended to update Ignite Realtime Openfire to a patched version or apply the necessary security patches provided by the vendor.