{ "schema_version": "1.4.0", "id": "GHSA-xx95-62h6-h7v3", "modified": "2024-12-27T00:32:07Z", "published": "2024-12-26T20:20:12Z", "aliases": [ "CVE-2024-56361" ], "summary": "lgsl Stored Cross-Site Scripting vulnerability", "details": "### Summary\n\nA stored cross-site scripting (XSS) vulnerability was identified in lgsl. The issue arises from improper sanitation of user input. Everyone who accesses this page will be affected by this attack.\n\n### Details\n\nThe function `lgsl_query_40` in `lgsl_protocol.php` has implemented an HTTP crawler. This function makes a request to the registered game server, and upon crawling the malicious `/info` endpoint with our payload, will render our javascript on the info page. This information is being displayed via `lgsl_details.php`\n\n#### Affected Code:\n```php\n foreach ($server['e'] as $field => $value) {\n $value = preg_replace('/((https*:\\/\\/|https*:\\/\\/www\\.|www\\.)[\\w\\d\\.\\-\\/=$?]*)/i', \"$1\", html_entity_decode($value));\n $output .= \"\n