An issue was discovered in GFI Kerio Control 9.2.5 through 9.4.5. The dest GET parameter passed to the /nonauth/addCertException.cs and /nonauth/guestConfirm.cs and /nonauth/expiration.cs pages is not properly sanitized before being used to generate a Location HTTP header in a 302 HTTP response. This can be exploited to perform Open Redirect or HTTP Response Splitting attacks, which in turn lead to Reflected Cross-Site Scripting (XSS). Remote command execution can be achieved by leveraging the upgrade feature in the admin interface.
Metrics
Affected Vendors & Products
References
History
Wed, 12 Feb 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 31 Jan 2025 08:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Fri, 31 Jan 2025 08:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-113 | |
Metrics |
cvssV3_1
|
Fri, 31 Jan 2025 07:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An issue was discovered in GFI Kerio Control 9.2.5 through 9.4.5. The dest GET parameter passed to the /nonauth/addCertException.cs and /nonauth/guestConfirm.cs and /nonauth/expiration.cs pages is not properly sanitized before being used to generate a Location HTTP header in a 302 HTTP response. This can be exploited to perform Open Redirect or HTTP Response Splitting attacks, which in turn lead to Reflected Cross-Site Scripting (XSS). Remote command execution can be achieved by leveraging the upgrade feature in the admin interface. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published: 2025-01-31T00:00:00.000Z
Updated: 2025-02-12T20:41:37.262Z
Reserved: 2024-11-17T00:00:00.000Z
Link: CVE-2024-52875

Updated: 2025-01-31T08:03:25.716Z

Status : Received
Published: 2025-01-31T08:15:07.827
Modified: 2025-01-31T08:15:07.827
Link: CVE-2024-52875

No data.