Due to missing input sanitization, an attacker can perform cross-site-scripting attacks and run arbitrary Javascript in the browser of other users. The "Edit Disclaimer Text" function of the configuration menu is vulnerable to stored XSS. Only the users Poweruser and Admin can use this function which is available at the URL https://$SCANNER/cgi/admin.cgi?-rdisclaimer+-apre The stored Javascript payload will be executed every time the ScanWizard is loaded, even in the Kiosk-mode browser.
History

Mon, 03 Nov 2025 23:30:00 +0000

Type Values Removed Values Added
References

Thu, 12 Dec 2024 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 12 Dec 2024 13:00:00 +0000

Type Values Removed Values Added
Description Due to missing input sanitization, an attacker can perform cross-site-scripting attacks and run arbitrary Javascript in the browser of other users. The "Edit Disclaimer Text" function of the configuration menu is vulnerable to stored XSS. Only the users Poweruser and Admin can use this function which is available at the URL https://$SCANNER/cgi/admin.cgi?-rdisclaimer+-apre The stored Javascript payload will be executed every time the ScanWizard is loaded, even in the Kiosk-mode browser.
Title Stored cross site scripting
Weaknesses CWE-79
References

cve-icon MITRE

Status: PUBLISHED

Assigner: SEC-VLab

Published: 2024-12-12T12:38:49.985Z

Updated: 2025-11-03T22:21:58.993Z

Reserved: 2024-10-07T13:39:52.543Z

Link: CVE-2024-47947

cve-icon Vulnrichment

Updated: 2025-11-03T22:21:58.993Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-12-12T13:15:10.920

Modified: 2025-11-03T23:16:23.970

Link: CVE-2024-47947

cve-icon Redhat

No data.