CVE-2024-2594

7.1 HIGH

📋 TL;DR

CVE-2024-2594 is a Cross-Site Scripting (XSS) vulnerability in AMSS++ version 4.31 that allows remote attackers to inject malicious scripts via multiple parameters in the admin interface. This could enable session cookie theft when authenticated users visit specially crafted URLs. Organizations running AMSS++ 4.31 are affected.

💻 Affected Systems

Products:
  • AMSS++
Versions: 4.31
Operating Systems: Any OS running AMSS++
Default Config Vulnerable: ⚠️ Yes
Notes: Requires admin interface access; vulnerability is in /amssplus/admin/index.php

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of admin accounts leading to unauthorized access, data theft, privilege escalation, and potential full system compromise if admin credentials are reused.

🟠

Likely Case

Session hijacking of authenticated admin users, allowing attackers to perform unauthorized actions within the AMSS++ application.

🟢

If Mitigated

Limited impact with proper input validation, output encoding, and security controls in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires social engineering to trick authenticated users into visiting malicious URLs

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-amssplus-amss

Restart Required: No

Instructions:

1. Check vendor for updated version
2. Apply input validation and output encoding
3. Implement Content Security Policy headers

🔧 Temporary Workarounds

Input Validation Filter

all

Implement server-side input validation for all parameters in /amssplus/admin/index.php

# Add input sanitization in PHP code
$clean_input = htmlspecialchars($_GET['parameter'], ENT_QUOTES, 'UTF-8');

Content Security Policy

all

Implement CSP headers to prevent script execution from untrusted sources

# Add to .htaccess or web server config
Header set Content-Security-Policy "default-src 'self'; script-src 'self'"
# PHP implementation
header("Content-Security-Policy: default-src 'self'; script-src 'self'");

🧯 If You Can't Patch

  • Restrict access to /amssplus/admin/ to trusted IP addresses only
  • Implement web application firewall (WAF) rules to block XSS payloads

🔍 How to Verify

Check if Vulnerable:

Test by attempting to inject script payloads into parameters of /amssplus/admin/index.php and checking if they execute

Check Version:

# Check AMSS++ version in admin interface or configuration files

Verify Fix Applied:

Verify that script payloads are properly encoded and do not execute when submitted

📡 Detection & Monitoring

Log Indicators:

  • Unusual parameter values containing script tags or JavaScript in /amssplus/admin/index.php access logs
  • Multiple failed login attempts followed by successful admin access

Network Indicators:

  • HTTP requests to /amssplus/admin/index.php with suspicious parameter values
  • Outbound connections to unknown domains from admin sessions

SIEM Query:

source="web_access_logs" AND uri="/amssplus/admin/index.php" AND (param="<script>" OR param="javascript:")

🔗 References

📤 Share & Export