{"id":7601,"date":"2020-09-21T21:43:56","date_gmt":"2020-09-22T04:43:56","guid":{"rendered":"https:\/\/webdev.securin.xyz\/?p=7601"},"modified":"2023-04-05T12:42:56","modified_gmt":"2023-04-05T19:42:56","slug":"how-to-detect-vulnerability-cve-2020-24602","status":"publish","type":"post","link":"https:\/\/webdev.securin.xyz\/articles\/how-to-detect-vulnerability-cve-2020-24602\/","title":{"rendered":"How to Detect Vulnerability CVE-2020-24602?"},"content":{"rendered":"
Cyber Security Works discovered a new zero-day vulnerability, CVE-2020-24602 in Ignite Realtime Openfire 4.5.1. Openfire (formerly Wildfire). Openfire is a cross-platform real-time collaboration server based on the XMPP protocol. The vulnerability was discovered by CSW Security Researcher on Feb 5 2020.<\/p>\n
CVE-2020-24602 was detected manually using the burp suite tool. In the Openfire application, the search functionality in the admin account is vulnerable to reflected cross-site scripting attacks due to missing input validation and lack of output encoding.<\/p>\n
The vulnerability was disclosed to Openfire on Feb 5, 2020. The vendor responded and released a patch on March 6, 2020, to mitigate this vulnerability.<\/p>\n
Date<\/b><\/td>\n | Description<\/b><\/td>\n<\/tr>\nFeb 4, 2020<\/td>\n | Vulnerability discovered by CSW Security Researcher.<\/td>\n<\/tr>\n | Feb 5,\u00a0 2020<\/td>\n | Reported to Vendor<\/td>\n<\/tr>\n | Feb 6, 2020<\/td>\n | The Vendor confirmed the vulnerability<\/td>\n<\/tr>\n | Feb 13, 2020<\/td>\n | Follow up with vendor for fix release<\/td>\n<\/tr>\n | Mar 13, 2020<\/td>\n | Follow up with Vendor for fix release<\/td>\n<\/tr>\n | Mar 6, 2020<\/td>\n | Vendor responded fix released and confirmed changes will be part of Openfire 4.5.1<\/td>\n<\/tr>\n | Aug 24, 2020<\/td>\n | CVE assigned<\/td>\n<\/tr>\n | Sep 1, 2020<\/td>\n | Vendor updated CVE<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n | Vulnerability Analysis<\/strong><\/h2>\nProduct<\/strong>: Openfire Product<\/p>\n Vendor<\/strong>: Ignite Realtime<\/p>\n Product version<\/strong>: Openfire version 4.5.1<\/p>\n Privilege<\/strong>: admin<\/p>\n Request type<\/strong>: GET<\/p>\n Vulnerable URL<\/strong>: http:\/\/localhost:9090\/server-properties.jsp<\/a>,<\/p>\n |