{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-11986","assignerOrgId":"a6d3dc9e-0591-4a13-bce7-0f5b31ff6158","state":"PUBLISHED","assignerShortName":"ENISA","dateReserved":"2024-11-29T07:20:34.286Z","datePublished":"2024-12-13T13:46:54.204Z","dateUpdated":"2024-12-13T20:41:28.545Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","platforms":["Windows"],"product":"CrushFTP","vendor":"CrushFTP, LLC","versions":[{"lessThan":"10.8.2","status":"affected","version":"10.0.0","versionType":"semver"},{"lessThan":"11.2.1","status":"affected","version":"11.0.0","versionType":"semver"}]}],"credits":[{"lang":"en","type":"finder","value":"European Commission, Application Security Testing Services"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<span style=\"background-color: rgba(63, 67, 80, 0.04);\">Improper input handling in the 'Host Header' allows an unauthenticated attacker to store a payload in web application logs. When an Administrator views the logs using the application's standard functionality, it enables the execution of the payload, resulting in Stored XSS or 'Cross-Site Scripting'.</span>\n\n<br>"}],"value":"Improper input handling in the 'Host Header' allows an unauthenticated attacker to store a payload in web application logs. When an Administrator views the logs using the application's standard functionality, it enables the execution of the payload, resulting in Stored XSS or 'Cross-Site Scripting'."}],"impacts":[{"capecId":"CAPEC-592","descriptions":[{"lang":"en","value":"CAPEC-592 Stored XSS"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.6,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-79","description":"CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"a6d3dc9e-0591-4a13-bce7-0f5b31ff6158","shortName":"ENISA","dateUpdated":"2024-12-13T13:46:54.204Z"},"references":[{"url":"https://crushftp.com/crush11wiki/Wiki.jsp?page=Update"}],"source":{"discovery":"UNKNOWN"},"title":"Stored XSS in CrushFTP","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-12-13T20:41:08.250727Z","id":"CVE-2024-11986","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-12-13T20:41:28.545Z"}}]}}