CVE-2023-42249
📋 TL;DR
This vulnerability allows attackers to inject malicious scripts into the Visual Access Manager web interface via the vam/vam_visits.php endpoint. When exploited, these scripts execute in victims' browsers, potentially stealing session cookies, redirecting users, or performing actions on their behalf. Organizations using Selesta Visual Access Manager versions before 4.42.2 are affected.
💻 Affected Systems
- Selesta Visual Access Manager
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers could steal administrator session cookies, gain full administrative access to the Visual Access Manager system, modify access controls, and potentially pivot to other systems.
Likely Case
Attackers steal user session cookies to impersonate legitimate users, access sensitive information, or perform unauthorized actions within the access management system.
If Mitigated
With proper input validation and output encoding, malicious scripts are neutralized before reaching users' browsers, preventing successful exploitation.
🎯 Exploit Status
XSS vulnerabilities typically have low exploitation complexity, but this specific exploit may require some authentication level.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 4.42.2
Vendor Advisory: https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md
Restart Required: Yes
Instructions:
1. Download Visual Access Manager version 4.42.2 or later from official vendor sources. 2. Backup current installation and configuration. 3. Apply the update following vendor documentation. 4. Restart the Visual Access Manager service.
🔧 Temporary Workarounds
Input Validation Filter
allImplement server-side input validation to sanitize user input before processing in vam_visits.php
Modify vam/vam_visits.php to include input sanitization functions
Web Application Firewall
allDeploy a WAF with XSS protection rules to filter malicious requests
Configure WAF to block requests containing script tags and JavaScript patterns
🧯 If You Can't Patch
- Implement Content Security Policy headers to restrict script execution
- Disable or restrict access to vam/vam_visits.php endpoint if not required
🔍 How to Verify
Check if Vulnerable:
Check if Visual Access Manager version is below 4.42.2 and test vam_visits.php endpoint with XSS payloads
Check Version:
Check Visual Access Manager web interface or configuration files for version information
Verify Fix Applied:
Verify version is 4.42.2 or higher and test that XSS payloads no longer execute
📡 Detection & Monitoring
Log Indicators:
- Unusual POST/GET requests to vam_visits.php containing script tags or JavaScript code
- Multiple failed authentication attempts followed by vam_visits.php access
Network Indicators:
- HTTP requests containing <script> tags or JavaScript functions in parameters
- Unusual traffic patterns to vam_visits.php endpoint
SIEM Query:
source="web_server" AND (url="*/vam/vam_visits.php*" AND (param="*<script>*" OR param="*javascript:*"))