CVE-2024-21496

All versions of the package github.com/greenpau/caddy-security are vulnerable to Cross-site Scripting (XSS) via the Referer header, due to improper input sanitization. Although the Referer header is sanitized by escaping some characters that can allow XSS (e.g., [&], [<], [>], ["], [']), it does not account for the attack based on the JavaScript URL scheme (e.g., javascript:alert(document.domain)// payload). Exploiting this vulnerability may not be trivial, but it could lead to the execution of malicious scripts in the context of the target user’s browser, compromising user sessions.
Configurations

Configuration 1 (hide)

cpe:2.3:a:authcrunch:caddy-security:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2024-02-17 05:15

Updated : 2025-12-23 20:09


NVD link : CVE-2024-21496

Mitre link : CVE-2024-21496

CVE.ORG link : CVE-2024-21496


JSON object : View

Products Affected

authcrunch

  • caddy-security
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')