The Frentix GmbH OpenOlat LMS is affected by stored a Cross-Site Scripting (XSS) vulnerability. It is possible to upload files within the Media Center of OpenOlat version 18.1.5 (or lower) as an authenticated user without any other rights. Although the filetypes are limited, an SVG image containing an XSS payload can be uploaded. After a successful upload the file can be shared with groups of users (including admins) who can be attacked with the JavaScript payload.
References
Link | Resource |
---|---|
http://seclists.org/fulldisclosure/2024/Feb/23 | Exploit Mailing List Third Party Advisory |
https://r.sec-consult.com/openolat | Exploit Third Party Advisory |
http://seclists.org/fulldisclosure/2024/Feb/23 | Exploit Mailing List Third Party Advisory |
https://r.sec-consult.com/openolat | Exploit Third Party Advisory |
Configurations
History
02 Apr 2025, 20:10
Type | Values Removed | Values Added |
---|---|---|
First Time |
Frentix openolat
Frentix |
|
CPE | cpe:2.3:a:frentix:openolat:*:*:*:*:*:*:*:* | |
References | () http://seclists.org/fulldisclosure/2024/Feb/23 - Exploit, Mailing List, Third Party Advisory | |
References | () https://r.sec-consult.com/openolat - Exploit, Third Party Advisory | |
CWE | CWE-79 |
Information
Published : 2024-02-20 08:15
Updated : 2025-04-02 20:10
NVD link : CVE-2024-25974
Mitre link : CVE-2024-25974
CVE.ORG link : CVE-2024-25974
JSON object : View
Products Affected
frentix
- openolat