Skip to content

jet-pentest/CVE-2024-25175

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 

Repository files navigation

CVE-2024-25175

Reflected XSS via HTTP Response Splitting

Description: Exploitation of this vulnerability can lead to the execution of JavaScript code in the victim's browser (Cross-Site Scripting) when following a specially crafted link. The vulnerability arises because The web server does not correctly process line breaks (\r\n or CR\LF, in urlencode it is %0d%0a).

Impact: Reflected XSS

CVSSv3.1 vector: AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N (6.1)

CWE: CWE-20: Improper Input Validation

Affected Component: GET parameter kickidler_authentication_token

Vendor: Kickidler: Employee Monitoring Software

Affected Product

  • Kickdler Server before version 1.107.0

Steps to reproduce:

http://[IP_kickdler_server]:8123/?kickidler_authentication_token=test%0d%0a%0d%0a%3Cscript%3Ealert(document.domain)%3C/script%3E

Request in Burp Suite Result

Discoverer

References

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published