Skip to main content

CVE-2024-57529: n/a in n/a

Medium
VulnerabilityCVE-2024-57529cvecve-2024-57529
Published: Wed May 21 2025 (05/21/2025, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

Cross Site Scripting vulnerability in Jeppesen JetPlanner Pro v.1.6.2.20 allows a remote attacker to execute arbitrary code.

AI-Powered Analysis

AILast updated: 07/07/2025, 10:10:16 UTC

Technical Analysis

CVE-2024-57529 is a Cross Site Scripting (XSS) vulnerability identified in Jeppesen JetPlanner Pro version 1.6.2.20. XSS vulnerabilities occur when an application includes untrusted data in a web page without proper validation or escaping, allowing attackers to inject malicious scripts that execute in the context of the victim's browser. In this case, the vulnerability enables a remote attacker to execute arbitrary code by injecting malicious scripts, potentially through crafted input fields or URL parameters within the JetPlanner Pro application. The CVSS 3.1 base score is 6.1, indicating a medium severity level. The vector string (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) reveals that the attack can be launched remotely over the network without requiring privileges, but it does require user interaction (such as clicking a malicious link). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. The impact affects confidentiality and integrity to a limited extent but does not affect availability. No patches or known exploits are currently reported, and the vendor/project details are not specified. The vulnerability is classified under CWE-79, which is the standard identifier for XSS issues. Given the nature of JetPlanner Pro as an aviation planning tool, exploitation could lead to unauthorized script execution in the context of users, potentially leaking sensitive flight planning data or enabling further attacks such as session hijacking or phishing within the application environment.

Potential Impact

For European organizations, particularly those in the aviation sector using Jeppesen JetPlanner Pro, this vulnerability could lead to unauthorized disclosure of sensitive flight planning information, manipulation of data integrity, and potential compromise of user sessions. This could disrupt operational planning and decision-making processes. While the vulnerability does not directly impact availability, the confidentiality and integrity breaches could have cascading effects on operational security and compliance with data protection regulations such as GDPR. Attackers exploiting this vulnerability could target airline operators, flight planners, and related aviation service providers, potentially leading to reputational damage and regulatory penalties. The requirement for user interaction means phishing or social engineering could be used to trick users into executing malicious scripts, increasing the risk in environments where users may not be fully trained on cybersecurity hygiene.

Mitigation Recommendations

Organizations should implement strict input validation and output encoding within the JetPlanner Pro application to neutralize malicious scripts. Until an official patch is released, users should be educated about the risks of clicking on suspicious links or opening untrusted inputs related to JetPlanner Pro. Network-level protections such as Web Application Firewalls (WAFs) can be configured to detect and block common XSS attack patterns targeting the application. Additionally, deploying Content Security Policy (CSP) headers can help restrict the execution of unauthorized scripts in the browser context. Monitoring and logging user activities within JetPlanner Pro can help detect anomalous behavior indicative of exploitation attempts. Organizations should also engage with the vendor or software provider to obtain timely patches or updates. Regular security awareness training focusing on phishing and social engineering can reduce the likelihood of successful exploitation requiring user interaction.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-01-09T00:00:00.000Z
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682e1d8dc4522896dcc6a53d

Added to database: 5/21/2025, 6:38:05 PM

Last enriched: 7/7/2025, 10:10:16 AM

Last updated: 8/8/2025, 6:22:12 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats