CVE-2024-1143

9.3 CRITICAL

📋 TL;DR

Central Dogma versions before 0.64.1 contain a cross-site scripting (XSS) vulnerability that allows attackers to inject malicious scripts into web pages. This could lead to session hijacking and authentication bypass for users accessing vulnerable Central Dogma instances. Organizations using Central Dogma for configuration management are affected.

💻 Affected Systems

Products:
  • Central Dogma
Versions: All versions prior to 0.64.1
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments of Central Dogma before version 0.64.1 are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers steal administrator session cookies, gain full administrative access to Central Dogma, modify configuration data, and potentially pivot to other systems.

🟠

Likely Case

Attackers steal user session tokens to access Central Dogma with the victim's permissions, potentially modifying configuration data or accessing sensitive information.

🟢

If Mitigated

With proper input validation and output encoding, the XSS payloads are neutralized, preventing script execution and maintaining session integrity.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

XSS vulnerabilities typically have low exploitation complexity once the injection vector is identified. Exploitation requires user interaction with malicious content.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.64.1

Vendor Advisory: https://github.com/line/centraldogma/security/advisories/GHSA-34q3-p352-c7q8

Restart Required: Yes

Instructions:

1. Stop Central Dogma service. 2. Update to version 0.64.1 or later. 3. Restart Central Dogma service. 4. Verify the update was successful.

🔧 Temporary Workarounds

Content Security Policy (CSP)

all

Implement a strict Content Security Policy to prevent inline script execution and restrict script sources.

Add 'Content-Security-Policy: default-src 'self'; script-src 'self'' to HTTP headers

Input Validation Filter

all

Implement web application firewall or proxy filtering to sanitize user input before it reaches Central Dogma.

🧯 If You Can't Patch

  • Isolate Central Dogma instances behind authentication gateways and restrict access to trusted users only.
  • Implement network segmentation to limit Central Dogma's exposure and monitor for suspicious activity.

🔍 How to Verify

Check if Vulnerable:

Check Central Dogma version. If version is less than 0.64.1, the system is vulnerable.

Check Version:

curl -s http://centraldogma-host:port/api/v0/version | grep version

Verify Fix Applied:

Confirm Central Dogma version is 0.64.1 or higher and test for XSS payload execution.

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP requests containing script tags or JavaScript payloads in query parameters or headers
  • Multiple failed authentication attempts followed by successful login from same IP

Network Indicators:

  • HTTP requests containing <script>, javascript:, or encoded XSS payloads
  • Unexpected outbound connections from Central Dogma server

SIEM Query:

source="centraldogma" AND (http_uri="*<script>*" OR http_uri="*javascript:*" OR http_user_agent="*<script>*")

🔗 References

📤 Share & Export