Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-34241 | Improper input handling in the 'Host Header' allows an unauthenticated attacker to store a payload in web application logs. When an Administrator views the logs using the application's standard functionality, it enables the execution of the payload, resulting in Stored XSS or 'Cross-Site Scripting'. |
| Link | Providers |
|---|---|
| https://crushftp.com/crush11wiki/Wiki.jsp?page=Update |
|
Fri, 13 Dec 2024 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improper input handling in the 'Host Header' allows an unauthenticated attacker to store a payload in web application logs. When an Administrator views the logs using the application's standard functionality, it enables the execution of the payload, resulting in Stored XSS or 'Cross-Site Scripting'. | |
| Title | Stored XSS in CrushFTP | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: ENISA
Published:
Updated: 2024-12-13T20:41:28.545Z
Reserved: 2024-11-29T07:20:34.286Z
Link: CVE-2024-11986
No data.
Status : Deferred
Published: 2024-12-13T14:15:21.207
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-11986
No data.
OpenCVE Enrichment
Updated: 2025-07-21T15:17:43Z
EUVD