CVE-2024-24275

9.6 CRITICAL

📋 TL;DR

A cross-site scripting (XSS) vulnerability in Teamwire Windows desktop client versions 2.0.1 through 2.4.0 allows remote attackers to inject malicious scripts via the global search function. This could enable attackers to steal sensitive information from users' sessions. All users of affected Teamwire desktop client versions on Windows are potentially at risk.

💻 Affected Systems

Products:
  • Teamwire Windows desktop client
Versions: 2.0.1 through 2.4.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the Windows desktop client; web and mobile versions may not be affected. The vulnerability requires user interaction with the global search function.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal authentication tokens, session cookies, or other sensitive data, potentially leading to account takeover, data exfiltration, or further network compromise.

🟠

Likely Case

Attackers craft malicious payloads that execute JavaScript in victims' browsers, allowing them to capture user input, redirect to phishing sites, or perform actions within the Teamwire application.

🟢

If Mitigated

With proper input validation and output encoding, malicious scripts would be neutralized before execution, preventing any data theft or unauthorized actions.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is well-documented in public research, making exploitation straightforward for attackers with basic web security knowledge.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 2.4.1 or later

Vendor Advisory: https://research.hisolutions.com/2020/08/web-vulnerabilities-are-coming-to-the-desktop-again-rces-and-other-vulnerabilities-in-teamwire/

Restart Required: Yes

Instructions:

1. Download the latest Teamwire desktop client from the official website or update through the application's built-in updater. 2. Install the update following the standard installation process. 3. Restart the Teamwire application to ensure the patch is applied.

🔧 Temporary Workarounds

Disable Global Search Function

windows

Temporarily disable or restrict access to the global search feature to prevent exploitation.

No specific commands; configure through application settings or group policy if available.

Implement Content Security Policy (CSP)

all

Apply CSP headers to restrict script execution from untrusted sources.

Add CSP headers via web server configuration or application settings.

🧯 If You Can't Patch

  • Restrict network access to the Teamwire client to trusted internal networks only.
  • Educate users to avoid clicking on suspicious links or entering untrusted data into the global search field.

🔍 How to Verify

Check if Vulnerable:

Check the Teamwire client version in the application's 'About' or settings menu. If version is between 2.0.1 and 2.4.0 inclusive, the system is vulnerable.

Check Version:

In Teamwire, go to Help > About Teamwire or check in the application settings.

Verify Fix Applied:

Verify the Teamwire client version is 2.4.1 or higher after applying the update.

📡 Detection & Monitoring

Log Indicators:

  • Unusual search queries containing JavaScript or HTML payloads in application logs.
  • Multiple failed search attempts with suspicious characters.

Network Indicators:

  • Outbound connections to unexpected domains following search activities.
  • Unusual data exfiltration patterns from the Teamwire client.

SIEM Query:

source="teamwire" AND (message="*<script>*" OR message="*javascript:*" OR message="*onerror=*" OR message="*onload=*")

🔗 References

📤 Share & Export