CVE-2024-52875

An issue was discovered in GFI Kerio Control 9.2.5 through 9.4.5. The dest GET parameter passed to the /nonauth/addCertException.cs and /nonauth/guestConfirm.cs and /nonauth/expiration.cs pages is not properly sanitized before being used to generate a Location HTTP header in a 302 HTTP response. This can be exploited to perform Open Redirect or HTTP Response Splitting attacks, which in turn lead to Reflected Cross-Site Scripting (XSS). Remote command execution can be achieved by leveraging the upgrade feature in the admin interface.
Configurations

No configuration.

History

31 Jan 2025, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-01-31 08:15

Updated : 2025-01-31 08:15


NVD link : CVE-2024-52875

Mitre link : CVE-2024-52875

CVE.ORG link : CVE-2024-52875


JSON object : View

Products Affected

No product.

CWE
CWE-113

Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting')