{"api_version":"1","generated_at":"2026-04-23T15:09:21+00:00","cve":"CVE-2020-24602","urls":{"html":"https://cve.report/CVE-2020-24602","api":"https://cve.report/api/cve/CVE-2020-24602.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2020-24602","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2020-24602"},"summary":{"title":"CVE-2020-24602","description":"Ignite Realtime Openfire 4.5.1 has a reflected Cross-site scripting vulnerability which allows an attacker to execute arbitrary malicious URL via the vulnerable GET parameter searchName\", \"searchValue\", \"searchDescription\", \"searchDefaultValue\",\"searchPlugin\", \"searchDescription\" and \"searchDynamic\" in the Server Properties and Security Audit Viewer JSP page","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2020-09-02 15:15:00","updated_at":"2020-11-10 19:39:00"},"problem_types":["CWE-79"],"metrics":[],"references":[{"url":"https://issues.igniterealtime.org/browse/OF-1963","name":"https://issues.igniterealtime.org/browse/OF-1963","refsource":"MISC","tags":["Vendor Advisory"],"title":"[OF-1963] Cross Site Scripting (XSS) issues - CSW Document No: C1055 CVE-2020-24601 CVE-2020-24602 CVE-2020-24604 - Ignite Realtime Jira","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://cybersecurityworks.com/zerodays/cve-2020-24602-ignite-realtime-openfire.html","name":"https://cybersecurityworks.com/zerodays/cve-2020-24602-ignite-realtime-openfire.html","refsource":"MISC","tags":["Exploit","Third Party Advisory"],"title":"CVE-2020-24602 - Multiple Cross-Site Scripting (XSS) in Openfire Product","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2020-24602","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-24602","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2020","cve_id":"24602","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"igniterealtime","cpe5":"openfire","cpe6":"4.5.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"24602","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"igniterealtime","cpe5":"openfire","cpe6":"4.5.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2020-24602","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Ignite Realtime Openfire 4.5.1 has a reflected Cross-site scripting vulnerability which allows an attacker to execute arbitrary malicious URL via the vulnerable GET parameter searchName\", \"searchValue\", \"searchDescription\", \"searchDefaultValue\",\"searchPlugin\", \"searchDescription\" and \"searchDynamic\" in the Server Properties and Security Audit Viewer JSP page"}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"url":"https://issues.igniterealtime.org/browse/OF-1963","refsource":"MISC","name":"https://issues.igniterealtime.org/browse/OF-1963"},{"refsource":"MISC","name":"https://cybersecurityworks.com/zerodays/cve-2020-24602-ignite-realtime-openfire.html","url":"https://cybersecurityworks.com/zerodays/cve-2020-24602-ignite-realtime-openfire.html"}]}},"nvd":{"publishedDate":"2020-09-02 15:15:00","lastModifiedDate":"2020-11-10 19:39:00","problem_types":["CWE-79"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":6.1,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.8,"impactScore":2.7},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":4.3},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:igniterealtime:openfire:4.5.1:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2020","CveId":"24602","Ordinal":"186012","Title":"CVE-2020-24602","CVE":"CVE-2020-24602","Year":"2020"},"notes":[{"CveYear":"2020","CveId":"24602","Ordinal":"1","NoteData":"Ignite Realtime Openfire 4.5.1 has a reflected Cross-site scripting vulnerability which allows an attacker to execute arbitrary malicious URL via the vulnerable GET parameter searchName\", \"searchValue\", \"searchDescription\", \"searchDefaultValue\",\"searchPlugin\", \"searchDescription\" and \"searchDynamic\" in the Server Properties and Security Audit Viewer JSP page","Type":"Description","Title":null},{"CveYear":"2020","CveId":"24602","Ordinal":"2","NoteData":"2020-09-02","Type":"Other","Title":"Published"},{"CveYear":"2020","CveId":"24602","Ordinal":"3","NoteData":"2020-10-28","Type":"Other","Title":"Modified"}]}}}