Security for everyone

CVE-2023-24367 Scanner

Detects 'Cross-Site Scripting' vulnerability in Temenos T24 R20 affects v. R20


Short Info




Single Scan

Can be used by

Asset Owner

Estimated Time

10 sec

Scan only one


Parent Category

CVE-2023-24367 Scanner Detail

Temenos T24 R20 is a comprehensive banking software solution used globally by retail, corporate, and private banks. This platform enables these institutions to manage day-to-day operations efficiently, offering modules for front and back office tasks, as well as banking services. Its versatility and integration capabilities make it a popular choice for financial organizations looking to enhance their digital transformation strategies. The software is developed by Temenos, a leader in banking software systems, providing innovative solutions to the financial sector. The purpose of this software is to streamline banking operations, improve customer experience, and facilitate compliance with financial regulations.

The vulnerability identified in Temenos T24 R20, classified under CVE-2023-24367, is a type of Cross-Site Scripting (XSS) attack. This specific flaw is found within the routineName parameter of the genrequest.jsp page, allowing attackers to inject malicious scripts. These scripts can be executed in the browser of an unsuspecting user, compromising the integrity and confidentiality of user sessions. Such vulnerabilities pose significant risks, including the theft of authentication credentials and the potential for further malicious activities.

The Cross-Site Scripting vulnerability in Temenos T24 R20 leverages the routineName parameter in the genrequest.jsp file to execute unauthorized script code in a user's browser. By crafting a malicious URL that includes a script injection in the routineName parameter, an attacker can trigger the execution of arbitrary JavaScript code. This vulnerability does not require authentication, making it accessible to any attacker who can convince a user to click on a specially crafted link. The execution context is within the security domain of the application, allowing for a wide range of web-based attacks. This issue underscores the importance of validating and encoding user inputs to prevent malicious data from being rendered in web pages.

Exploiting this XSS vulnerability could lead to several adverse outcomes for both users and the financial institution utilizing Temenos T24 R20. Attackers might steal session cookies, enabling them to impersonate legitimate users and gain unauthorized access to sensitive account information. Additionally, this could lead to the manipulation of web content displayed to users, defacement of the web application, and the execution of phishing attacks. Ultimately, this vulnerability could erode trust in the financial institution, lead to financial loss for customers, and damage the institution's reputation.

By utilizing the security scanning services offered by securityforeveryone, users can identify and address vulnerabilities like CVE-2023-24367 in their digital assets. Our platform leverages sophisticated scanning technology to detect a wide range of security weaknesses, providing detailed insights into potential risks. Membership grants access to continuous monitoring, timely alerts, and expert guidance on remediation strategies. Ensuring your digital infrastructure is secure not only protects your data but also maintains customer trust and compliance with regulatory standards. Join securityforeveryone today to fortify your cybersecurity posture.



cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture