CVE-2024-52875

An issue was discovered in GFI Kerio Control 9.2.5 through 9.4.5. The dest GET parameter passed to the /nonauth/addCertException.cs and /nonauth/guestConfirm.cs and /nonauth/expiration.cs pages is not properly sanitized before being used to generate a Location HTTP header in a 302 HTTP response. This can be exploited to perform Open Redirect or HTTP Response Splitting attacks, which in turn lead to Reflected Cross-Site Scripting (XSS). Remote command execution can be achieved by leveraging the upgrade feature in the admin interface.
References
Link Resource
https://karmainsecurity.com/hacking-kerio-control-via-cve-2024-52875 Exploit Third Party Advisory
http://seclists.org/fulldisclosure/2024/Dec/15 Exploit Mailing List Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:gfi:kerio_control:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-01-31 08:15

Updated : 2025-09-16 17:29


NVD link : CVE-2024-52875

Mitre link : CVE-2024-52875

CVE.ORG link : CVE-2024-52875


JSON object : View

Products Affected

gfi

  • kerio_control
CWE
CWE-113

Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting')