First published: Fri Aug 16 2024(Updated: )
A reflected cross-site scripting (XSS) vulnerability exists in user/login.php at line 24 in ZZCMS 2023 and earlier. The application directly inserts the value of the HTTP_REFERER header into the HTML response without proper sanitization. An attacker can exploit this vulnerability by tricking a user into visiting a specially crafted URL, which includes a malicious Referer header. This can lead to the execution of arbitrary JavaScript code in the context of the victim's browser, potentially resulting in session hijacking, defacement, or other malicious activities.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ZZCMS | <=2023 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-43009 is considered a high-severity vulnerability due to its ability to allow reflected cross-site scripting attacks.
To fix CVE-2024-43009, you should sanitize the HTTP_REFERER header input before rendering it in the HTML response.
CVE-2024-43009 affects ZZCMS versions 2023 and earlier.
CVE-2024-43009 is classified as a reflected cross-site scripting (XSS) vulnerability.
Yes, attackers can exploit CVE-2024-43009 easily by tricking users into visiting malicious links that leverage the vulnerability.