Due to missing input sanitization, an attacker can perform cross-site-scripting attacks and run arbitrary Javascript in the browser of other users. The login page at /cgi/slogin.cgi suffers from XSS due to improper input filtering of the -tsetup+-uuser parameter, which can only be exploited if the target user is not already logged in. This makes it ideal for login form phishing attempts.
History

Mon, 03 Nov 2025 22:30:00 +0000

Type Values Removed Values Added
References

Thu, 12 Dec 2024 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 12 Dec 2024 14:15:00 +0000

Type Values Removed Values Added
Description The password change function at /cgi/admin.cgi does not require the current/old password, which makes the application vulnerable to account takeover. An attacker can use this to forcefully set a new password within the -rsetpass+-aaction+- parameter for a user without knowing the old password, e.g. by exploiting a CSRF issue. Due to missing input sanitization, an attacker can perform cross-site-scripting attacks and run arbitrary Javascript in the browser of other users. The login page at /cgi/slogin.cgi suffers from XSS due to improper input filtering of the -tsetup+-uuser parameter, which can only be exploited if the target user is not already logged in. This makes it ideal for login form phishing attempts.
Title Insecure Password Change Function Reflected Cross Site Scripting
Weaknesses CWE-620

Thu, 12 Dec 2024 13:30:00 +0000

Type Values Removed Values Added
Description Due to missing input sanitization, an attacker can perform cross-site-scripting attacks and run arbitrary Javascript in the browser of other users. The login page at /cgi/slogin.cgi suffers from reflected XSS due to improper input filtering of the -tsetup+-uuser parameter, which can only be exploited if the target user is not already logged in, which makes it ideal for login form phishing attempts. The password change function at /cgi/admin.cgi does not require the current/old password, which makes the application vulnerable to account takeover. An attacker can use this to forcefully set a new password within the -rsetpass+-aaction+- parameter for a user without knowing the old password, e.g. by exploiting a CSRF issue.
Title Reflected cross site scripting Insecure Password Change Function
Weaknesses CWE-620

Thu, 12 Dec 2024 13:15:00 +0000

Type Values Removed Values Added
Description Due to missing input sanitization, an attacker can perform cross-site-scripting attacks and run arbitrary Javascript in the browser of other users. The login page at /cgi/slogin.cgi suffers from reflected XSS due to improper input filtering of the -tsetup+-uuser parameter, which can only be exploited if the target user is not already logged in, which makes it ideal for login form phishing attempts.
Title Reflected cross site scripting
Weaknesses CWE-79
References

cve-icon MITRE

Status: PUBLISHED

Assigner: SEC-VLab

Published: 2024-12-12T12:51:14.761Z

Updated: 2025-11-03T21:55:19.162Z

Reserved: 2024-05-29T06:48:49.688Z

Link: CVE-2024-36494

cve-icon Vulnrichment

Updated: 2025-11-03T21:55:19.162Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-12-12T13:15:10.160

Modified: 2025-11-03T22:16:59.180

Link: CVE-2024-36494

cve-icon Redhat

No data.