CVE-2023-42245

6.1 MEDIUM

📋 TL;DR

CVE-2023-42245 is a cross-site scripting vulnerability in Selesta Visual Access Manager that allows attackers to inject malicious scripts into web pages viewed by other users. This affects all users of Visual Access Manager versions below 4.42.2 who access the vulnerable monitor/s_scheduledfile.php endpoint.

💻 Affected Systems

Products:
  • Selesta Visual Access Manager
Versions: All versions < 4.42.2
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the monitor/s_scheduledfile.php endpoint which is typically accessible to authenticated users.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, perform actions as authenticated users, redirect users to malicious sites, or install malware via drive-by downloads.

🟠

Likely Case

Session hijacking leading to unauthorized access, credential theft, or defacement of the application interface.

🟢

If Mitigated

Limited impact with proper input validation, output encoding, and Content Security Policy headers in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

XSS vulnerabilities are commonly exploited and require user interaction (victim must visit malicious page).

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.42.2

Vendor Advisory: https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md

Restart Required: Yes

Instructions:

1. Download Visual Access Manager version 4.42.2 or later from official vendor sources. 2. Backup current installation and configuration. 3. Apply the update following vendor documentation. 4. Restart the Visual Access Manager service.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement server-side input validation to sanitize user input before processing.

Implement input validation in monitor/s_scheduledfile.php to filter script tags and special characters

Output Encoding

all

Apply proper output encoding when displaying user-controlled data.

Use HTML entity encoding for all user-supplied data in the affected endpoint

🧯 If You Can't Patch

  • Implement a Web Application Firewall (WAF) with XSS protection rules
  • Disable or restrict access to the monitor/s_scheduledfile.php endpoint if not required

🔍 How to Verify

Check if Vulnerable:

Check if Visual Access Manager version is below 4.42.2 and test the monitor/s_scheduledfile.php endpoint with XSS payloads.

Check Version:

Check the Visual Access Manager administration interface or configuration files for version information.

Verify Fix Applied:

Verify version is 4.42.2 or higher and test that XSS payloads no longer execute in the affected endpoint.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST/GET requests to monitor/s_scheduledfile.php with script tags or JavaScript code
  • Multiple failed login attempts followed by XSS payload requests

Network Indicators:

  • HTTP requests containing <script> tags or JavaScript code in parameters
  • Unusual outbound connections from user browsers after visiting the vulnerable page

SIEM Query:

source="web_server_logs" AND (uri="/monitor/s_scheduledfile.php" AND (param CONTAINS "<script>" OR param CONTAINS "javascript:"))

🔗 References

📤 Share & Export