CVE-2024-58320
BaseFortify
Publication date: 2025-12-18
Last updated on: 2025-12-24
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| kentico | xperience | to 13.0.159 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-497 | The product does not properly prevent sensitive system-level information from being accessed by unauthorized actors who do not have the same level of access to the underlying system as the product does. |
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include applying the hotfix referenced by Kentico DevNet that addresses this vulnerability. Additionally, restricting access to the administration interface endpoints by network controls such as firewalls or IP whitelisting can reduce exposure. Monitoring and limiting public access to sensitive endpoints is also recommended until the patch is applied. [1]
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The provided resources do not specify how this vulnerability affects compliance with common standards and regulations such as GDPR or HIPAA.
Can you explain this vulnerability to me?
This vulnerability in Kentico Xperience allows unauthenticated public users to access sensitive hostname details of the administration interface during the authentication process. It occurs through a publicly accessible endpoint, exposing confidential internal network configuration information. This is an information disclosure issue classified under CWE-497, meaning sensitive system information is exposed to unauthorized users. [1]
How can this vulnerability impact me? :
The vulnerability can expose confidential internal network details to attackers without requiring any privileges or user interaction. This information disclosure could help attackers gather internal network configuration data, potentially facilitating further attacks against the system or network. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by attempting to access the publicly accessible endpoint that exposes the administration interface hostname details without authentication. Specific commands are not provided in the resources, but a common approach would be to use tools like curl or wget to send requests to the suspected endpoint and analyze the response for sensitive hostname information. For example, a command like 'curl http://<target>/path-to-authentication-endpoint' could be used to check if sensitive information is disclosed. [1]