{"id":"CVE-2020-24601","details":"In Ignite Realtime Openfire 4.5.1 a Stored Cross-site Vulnerability allows an attacker to execute an arbitrary malicious URL via the vulnerable POST parameter searchName\", \"alias\" in the import certificate trusted page","aliases":["BIT-openfire-2020-24601"],"modified":"2026-03-13T00:36:54.593946Z","published":"2020-09-02T15:15:10.317Z","references":[{"type":"ADVISORY","url":"https://issues.igniterealtime.org/browse/OF-1963"},{"type":"EVIDENCE","url":"https://cybersecurityworks.com/zerodays/cve-2020-24601-ignite-realtime-openfire.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/igniterealtime/openfire","events":[{"introduced":"0"},{"last_affected":"586a86b6c0ac0121dff8edd69e0ab79b0f07d2ca"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"4.5.1"}]}}],"versions":["attic/origin/master","attic/pubsub_clustering","attic/trunk","v3.10.0","v3.9.2","v3.9.3","v4.0.0","v4.0.0.beta","v4.1.0","v4.1.0beta","v4.2.0","v4.2.0beta","v4.3.0","v4.3.0beta","v4.4.0","v4.4.0beta","v4.5.0","v4.5.0beta","v4.5.1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-24601.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}]}