Due to missing input sanitization, an attacker can perform cross-site-scripting attacks and run arbitrary Javascript in the browser of other users. The "File Name" page (/cgi/uset.cgi?-cfilename) in the User Settings menu improperly filters the "file name" and wildcard character input field. By exploiting the wildcard character feature, attackers are able to store arbitrary Javascript code which is being triggered if the page is viewed afterwards, e.g. by higher privileged users such as admins. This attack can even be performed without being logged in because the affected functions are not fully protected. Without logging in, only the file name parameter of the "Default" User can be changed.
History

Mon, 03 Nov 2025 22:30:00 +0000

Type Values Removed Values Added
References

Thu, 12 Dec 2024 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 12 Dec 2024 13:00:00 +0000

Type Values Removed Values Added
Description Due to missing input sanitization, an attacker can perform cross-site-scripting attacks and run arbitrary Javascript in the browser of other users. The "File Name" page (/cgi/uset.cgi?-cfilename) in the User Settings menu improperly filters the "file name" and wildcard character input field. By exploiting the wildcard character feature, attackers are able to store arbitrary Javascript code which is being triggered if the page is viewed afterwards, e.g. by higher privileged users such as admins. This attack can even be performed without being logged in because the affected functions are not fully protected. Without logging in, only the file name parameter of the "Default" User can be changed.
Title Stored cross site scripting
Weaknesses CWE-79
References

cve-icon MITRE

Status: PUBLISHED

Assigner: SEC-VLab

Published: 2024-12-12T12:35:15.731Z

Updated: 2025-11-03T21:54:26.598Z

Reserved: 2024-03-05T09:15:40.202Z

Link: CVE-2024-28142

cve-icon Vulnrichment

Updated: 2025-11-03T21:54:26.598Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-12-12T13:15:09.763

Modified: 2025-11-03T22:16:50.053

Link: CVE-2024-28142

cve-icon Redhat

No data.