CVE-2023-49572

7.1 HIGH

📋 TL;DR

This vulnerability allows attackers to execute persistent cross-site scripting (XSS) attacks in VX Search Enterprise and Disk Pulse Enterprise. By injecting malicious JavaScript into ODBC configuration parameters, attackers can store payloads that execute when administrators view affected pages. Organizations using vulnerable versions of these Flexense products are affected.

💻 Affected Systems

Products:
  • VX Search Enterprise
  • Disk Pulse Enterprise
Versions: VX Search Enterprise 10.2.14, Disk Pulse Enterprise 10.4.18
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires access to the /setup_odbc endpoint, typically part of administrative interfaces.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator session cookies, perform actions as authenticated users, redirect to malicious sites, or install malware on administrator systems.

🟠

Likely Case

Session hijacking leading to unauthorized access, credential theft, or defacement of administrative interfaces.

🟢

If Mitigated

Limited impact if proper input validation and output encoding are implemented, though stored XSS remains dangerous.

🌐 Internet-Facing: HIGH if administrative interfaces are exposed to the internet, as unauthenticated attackers could target administrators.
🏢 Internal Only: MEDIUM for internal networks, requiring attacker access or social engineering to exploit.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires ability to submit malicious input to vulnerable parameters, typically through authenticated access or CSRF.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor for latest versions beyond affected ones

Vendor Advisory: https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-flexense-vx-search-enterprise

Restart Required: Yes

Instructions:

1. Check current version using product's about dialog. 2. Download latest version from Flexense website. 3. Install update following vendor instructions. 4. Restart application/services.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement server-side validation to sanitize odbc_data_source, odbc_user, and odbc_password parameters

Implement regex filtering: ^[a-zA-Z0-9_\-\.@]+$ for usernames
HTML encode all output from these parameters

Access Restriction

windows

Restrict access to /setup_odbc endpoint to trusted IP addresses only

Windows Firewall: New Inbound Rule blocking port for untrusted IPs
IIS/Web.config: <ipSecurity allowUnlisted="false"> with allowed IPs

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block XSS payloads in ODBC parameters
  • Disable or restrict ODBC configuration functionality if not required

🔍 How to Verify

Check if Vulnerable:

Test by submitting <script>alert('XSS')</script> to odbc_data_source, odbc_user, or odbc_password parameters and checking if script executes on page reload

Check Version:

In application: Help → About or check installed programs in Control Panel

Verify Fix Applied:

After patching, repeat vulnerability test; script should be properly encoded and not execute

📡 Detection & Monitoring

Log Indicators:

  • Unusual length or special characters in ODBC parameter values
  • Multiple failed login attempts followed by ODBC configuration changes

Network Indicators:

  • HTTP POST requests to /setup_odbc with script tags or JavaScript in parameters

SIEM Query:

source="web_logs" AND uri_path="/setup_odbc" AND (param="odbc_data_source" OR param="odbc_user" OR param="odbc_password") AND (content="<script" OR content="javascript:")

🔗 References

📤 Share & Export