CVE-2024-12641

9.6 CRITICAL

📋 TL;DR

TenderDocTransfer from Chunghwa Telecom has a reflected cross-site scripting (XSS) vulnerability combined with missing CSRF protection. Unauthenticated attackers can use phishing to execute arbitrary JavaScript in users' browsers, and since the application uses Node.js features, this can escalate to OS command execution. All users running vulnerable versions are affected.

💻 Affected Systems

Products:
  • Chunghwa Telecom TenderDocTransfer
Versions: All versions prior to patch
Operating Systems: Windows, Linux, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the local web server component that provides APIs for website communication.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution on affected systems leading to complete system compromise, data theft, and lateral movement within networks.

🟠

Likely Case

Attackers steal session cookies, credentials, or sensitive data through XSS, potentially leading to account takeover and data exfiltration.

🟢

If Mitigated

Limited impact with proper network segmentation, web application firewalls, and user awareness training reducing phishing success.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction via phishing but leverages well-known XSS and CSRF techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific version

Vendor Advisory: https://www.twcert.org.tw/en/cp-139-8299-42168-2.html

Restart Required: Yes

Instructions:

1. Check vendor advisory for patch availability. 2. Download and install the latest version from Chunghwa Telecom. 3. Restart the TenderDocTransfer application and any related services.

🔧 Temporary Workarounds

Disable or restrict TenderDocTransfer

all

Temporarily disable the vulnerable application until patching is possible

systemctl stop tenderdoctransfer
taskkill /F /IM TenderDocTransfer.exe

Implement network segmentation

all

Isolate systems running TenderDocTransfer from critical networks

🧯 If You Can't Patch

  • Implement strict Content Security Policy (CSP) headers to mitigate XSS impact
  • Deploy web application firewall (WAF) with XSS and CSRF protection rules

🔍 How to Verify

Check if Vulnerable:

Check if TenderDocTransfer is running and review version against vendor advisory

Check Version:

Check application interface or installation directory for version information

Verify Fix Applied:

Verify installation of patched version and test that XSS payloads no longer execute

📡 Detection & Monitoring

Log Indicators:

  • Unusual API calls to TenderDocTransfer endpoints
  • JavaScript execution in unexpected contexts

Network Indicators:

  • HTTP requests with suspicious JavaScript payloads in parameters
  • CSRF attempts to TenderDocTransfer APIs

SIEM Query:

source="*tenderdoctransfer*" AND (url="*<script>*" OR method="POST" AND referer="*")

🔗 References

📤 Share & Export