CVE-2024-27708

9.6 CRITICAL

📋 TL;DR

This CVE describes an iframe injection vulnerability in MyNET v.26.06 and earlier that allows remote attackers to execute arbitrary code via the src parameter. The vulnerability affects users of MyNET software from airc.pt, potentially enabling complete system compromise.

💻 Affected Systems

Products:
  • MyNET
Versions: v.26.06 and earlier
Operating Systems: Not specified, likely web application
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the solucoes-servicos.solucoes component of MyNET software from airc.pt

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to full system compromise, data theft, ransomware deployment, or creation of persistent backdoors.

🟠

Likely Case

Attackers inject malicious iframes to execute JavaScript or redirect users to phishing sites, potentially stealing credentials or session cookies.

🟢

If Mitigated

With proper input validation and output encoding, the vulnerability would be prevented, limiting impact to minor UI issues.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability appears to be in a web parameter, suggesting straightforward exploitation via crafted URLs.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.airc.pt/solucoes-servicos/solucoes?segment=MYN

Restart Required: No

Instructions:

1. Contact vendor for patched version. 2. Apply update when available. 3. Test functionality after update.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement server-side validation to reject malicious src parameter values containing iframe or script tags

WAF Rule

all

Deploy web application firewall rules to block requests containing suspicious iframe injection patterns

🧯 If You Can't Patch

  • Isolate affected systems from internet access
  • Implement strict network segmentation and monitor for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Test by attempting to inject iframe tags via the src parameter and observing if they execute

Check Version:

Check MyNET version in application interface or configuration files

Verify Fix Applied:

Retest injection attempts after applying fixes to confirm they are properly sanitized

📡 Detection & Monitoring

Log Indicators:

  • Unusual src parameter values containing iframe tags
  • Multiple failed injection attempts

Network Indicators:

  • HTTP requests with suspicious src parameters
  • Unexpected iframe loads in web traffic

SIEM Query:

web.url:*/solucoes-servicos.solucoes* AND web.param.src:*iframe*

🔗 References

📤 Share & Export