CVE-2021-44726

8.8 HIGH

📋 TL;DR

CVE-2021-44726 is a DOM-based cross-site scripting (XSS) vulnerability in KNIME Server's old WebPortal login page. It allows attackers to inject malicious scripts that execute in users' browsers when they visit the compromised login page. Organizations running KNIME Server versions before 4.13.4 are affected.

💻 Affected Systems

Products:
  • KNIME Server
Versions: Versions before 4.13.4
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the old WebPortal login page; the new login page is not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, credentials, or perform actions as authenticated users, potentially leading to complete system compromise if combined with other vulnerabilities.

🟠

Likely Case

Session hijacking, credential theft, or defacement of the login page with malicious content.

🟢

If Mitigated

Limited impact if proper input validation and output encoding are implemented, though the vulnerability still exists.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction (visiting the malicious login page), but no authentication is needed to trigger the vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.13.4

Vendor Advisory: https://docs.knime.com/2021-06/server_update_guide/index.html#_bugfixes

Restart Required: Yes

Instructions:

1. Download KNIME Server version 4.13.4 or later from the official KNIME website. 2. Stop the KNIME Server service. 3. Backup your current installation and configuration. 4. Install the updated version. 5. Restart the KNIME Server service. 6. Verify the update by checking the server version.

🔧 Temporary Workarounds

Disable Old WebPortal Login Page

all

Configure KNIME Server to use only the new login page and disable access to the old WebPortal login page.

Modify server configuration to set 'webportal.old.login.enabled=false' in knime-server.properties

🧯 If You Can't Patch

  • Implement a web application firewall (WAF) with XSS protection rules to block malicious payloads.
  • Restrict access to the KNIME Server login page to trusted IP addresses only.

🔍 How to Verify

Check if Vulnerable:

Check if the KNIME Server version is below 4.13.4 by accessing the server admin interface or checking the installation directory for version files.

Check Version:

On Linux: cat /path/to/knime-server/VERSION or check the web interface. On Windows: Check the installation directory for a VERSION file.

Verify Fix Applied:

After patching, confirm the server version is 4.13.4 or higher and test the old WebPortal login page for XSS payloads to ensure they are properly sanitized.

📡 Detection & Monitoring

Log Indicators:

  • Unusual login attempts with script-like parameters in URL or POST data
  • Errors related to malformed input on the login page

Network Indicators:

  • HTTP requests to the login page containing JavaScript or HTML payloads in parameters

SIEM Query:

source="knime-server" AND (url="*login*" AND (param="*<script>*" OR param="*javascript:*"))

🔗 References

📤 Share & Export