PatchSiren

PatchSiren cyber security CVE debrief

CVE-2014-9760 Gosa Project CVE debrief

CVE-2014-9760 describes a cross-site scripting (XSS) flaw in GOsa's login page handling. NVD identifies the issue in the displayLogin function in html/index.php, where remote attackers can inject arbitrary web script or HTML via the username field. The NVD record lists the issue as CVSS 3.1 6.1 (MEDIUM), with network attack vector and user interaction required.

Vendor
Gosa Project
Product
CVE-2014-9760
CVSS
MEDIUM 6.1
CISA KEV
Not listed in stored evidence
Original CVE published
2017-02-13
Original CVE updated
2026-05-13
Advisory published
2017-02-13
Advisory updated
2026-05-13

Who should care

GOsa administrators, operators of internet-facing GOsa login pages, and teams responsible for patching or hardening self-service or admin web portals should pay attention. Any deployment that exposes the login interface to untrusted users is most relevant.

Technical summary

The vulnerability is a CWE-79 cross-site scripting issue in GOsa's login display path. According to the NVD description, the displayLogin function in html/index.php does not properly neutralize username input before rendering it, allowing attacker-controlled script or HTML to execute in a victim's browser when the login page is viewed. The NVD CVSS vector (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) indicates a remotely reachable issue that requires a user to interact with the crafted content.

Defensive priority

Medium. The issue is remotely reachable and can affect browser sessions, but it requires user interaction and does not indicate direct availability impact. Prioritize faster if the GOsa login page is exposed to the public internet or used by privileged administrators.

Recommended defensive actions

  • Apply the vendor patch referenced in the upstream GOsa core commit included in the advisory references.
  • Verify that the login page properly HTML-encodes or otherwise sanitizes the username field before rendering it.
  • Restrict exposure of the GOsa login interface to trusted networks or management paths where possible.
  • Review browser-side hardening controls such as Content Security Policy as a defense-in-depth measure, while still fixing the underlying output-encoding flaw.
  • Confirm your deployed GOsa version against the vendor advisory and NVD record before and after remediation.

Evidence notes

This debrief is based on the supplied NVD record and its listed references. NVD describes the flaw as XSS in displayLogin within html/index.php in GOsa, allowing remote attackers to inject arbitrary web script or HTML via the username. The record maps the weakness to CWE-79 and reports CVSS 3.1 6.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N). References include the upstream GitHub commit e35b990464a2c2cf64d6833a217ed944876e7732, an oss-security mailing list post, and a SecurityFocus advisory entry.

Official resources

CVE published: 2017-02-13. NVD record modified: 2026-05-13. The supplied references show advisory and patch activity by 2016, but the CVE publication date above is the appropriate disclosure date for this record.