CVE-2024-10088

6.1 MEDIUM

📋 TL;DR

This CVE describes a reflected cross-site scripting (XSS) vulnerability in Internet Starter, a module of the SoftCOM iKSORIS system. Attackers can trick users into submitting malicious scripts through login forms, which then execute in the victim's browser context. Organizations using vulnerable versions of iKSORIS Internet Starter are affected.

💻 Affected Systems

Products:
  • SoftCOM iKSORIS Internet Starter module
Versions: All versions before 79.0
Operating Systems: Any OS running iKSORIS
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability affects the Internet Starter module specifically; other iKSORIS modules may not be affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal user session cookies, credentials, or perform actions on behalf of authenticated users, potentially leading to account takeover or data theft.

🟠

Likely Case

Attackers would typically use this to steal session cookies or credentials from users tricked into clicking malicious links, enabling unauthorized access to the iKSORIS system.

🟢

If Mitigated

With proper input validation and output encoding, the malicious scripts would be neutralized before execution, preventing exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Reflected XSS typically requires user interaction (clicking a malicious link) but is straightforward to exploit once the vulnerability is identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 79.0

Vendor Advisory: https://www.iksoris.pl/system-rezerwacji-i-sprzedazy-biletow-iksoris.html

Restart Required: Yes

Instructions:

1. Download version 79.0 or later from the vendor. 2. Backup current installation. 3. Apply the update according to vendor instructions. 4. Restart the iKSORIS service or server.

🔧 Temporary Workarounds

Implement WAF rules

all

Configure web application firewall to block XSS payloads in URL parameters and form inputs

Input validation middleware

all

Add server-side validation to sanitize user inputs in login forms

🧯 If You Can't Patch

  • Implement strict Content Security Policy (CSP) headers to prevent script execution from untrusted sources
  • Disable or restrict access to the Internet Starter module if not essential

🔍 How to Verify

Check if Vulnerable:

Test by attempting to inject script payloads into login form parameters and observing if they execute in the browser

Check Version:

Check the iKSORIS administration panel or configuration files for version information

Verify Fix Applied:

After patching, repeat the XSS test to confirm scripts are properly sanitized and do not execute

📡 Detection & Monitoring

Log Indicators:

  • Unusual script-like patterns in URL parameters or form submissions
  • Multiple failed login attempts with suspicious payloads

Network Indicators:

  • HTTP requests containing script tags or JavaScript in URL parameters
  • Traffic to known malicious domains following login attempts

SIEM Query:

source="web_logs" AND (url="*<script>*" OR url="*javascript:*" OR form_data="*<script>*")

🔗 References

📤 Share & Export