CVE-2024-2247

8.8 HIGH

📋 TL;DR

This DOM-based cross-site scripting vulnerability in JFrog Artifactory allows attackers to inject malicious scripts that execute in users' browsers when they interact with the import override mechanism. Attackers could steal session cookies, redirect users to malicious sites, or perform actions on behalf of authenticated users. Organizations running vulnerable JFrog Artifactory versions are affected.

💻 Affected Systems

Products:
  • JFrog Artifactory
Versions: Versions below 7.77.7 and below 7.82.1
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All Artifactory deployments with the vulnerable versions are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, compromise the entire Artifactory instance, and pivot to internal systems, potentially leading to supply chain attacks or data exfiltration.

🟠

Likely Case

Attackers steal session cookies or authentication tokens from authenticated users, gaining unauthorized access to the Artifactory instance and potentially modifying or exfiltrating stored artifacts.

🟢

If Mitigated

With proper network segmentation and web application firewalls, the impact is limited to potential session hijacking within the Artifactory application only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user interaction with the import override mechanism, but the technical complexity is low once the attack vector is identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.77.7 or 7.82.1 and above

Vendor Advisory: https://jfrog.com/help/r/jfrog-release-information/jfrog-security-advisories

Restart Required: Yes

Instructions:

1. Backup your Artifactory configuration and data. 2. Download the patched version (7.77.7 or 7.82.1+) from JFrog's official repository. 3. Follow JFrog's upgrade documentation for your specific deployment method. 4. Restart Artifactory services. 5. Verify the upgrade was successful.

🔧 Temporary Workarounds

Web Application Firewall (WAF)

all

Deploy a WAF with XSS protection rules to block malicious payloads targeting the import override mechanism.

Content Security Policy (CSP)

all

Implement strict CSP headers to prevent execution of unauthorized scripts.

🧯 If You Can't Patch

  • Restrict network access to Artifactory to trusted users only using firewall rules.
  • Implement strong session management with short timeouts and secure cookie attributes (HttpOnly, Secure).

🔍 How to Verify

Check if Vulnerable:

Check your Artifactory version via the web interface (Admin → System Info) or API. If version is below 7.77.7 or below 7.82.1, you are vulnerable.

Check Version:

curl -u admin:password http://artifactory-host/artifactory/api/system/version

Verify Fix Applied:

After patching, verify the version shows 7.77.7 or higher, or 7.82.1 or higher. Test the import override functionality to ensure it no longer accepts malicious input.

📡 Detection & Monitoring

Log Indicators:

  • Unusual import override requests with script tags or JavaScript payloads
  • Multiple failed authentication attempts following import activities

Network Indicators:

  • HTTP requests to Artifactory containing script injection patterns in import-related endpoints

SIEM Query:

source="artifactory" AND (uri_path="/import" OR uri_path="/override") AND (content="<script>" OR content="javascript:")

🔗 References

📤 Share & Export