CVE-2024-28772

6.8 MEDIUM

📋 TL;DR

IBM Security Directory Integrator 7.2.0 and IBM Security Verify Directory Integrator 10.0.0 contain a stored cross-site scripting (XSS) vulnerability that allows authenticated users to inject malicious JavaScript into the web interface. This could enable attackers to steal credentials or perform unauthorized actions within trusted user sessions. Organizations using these specific versions of IBM's directory integration products are affected.

💻 Affected Systems

Products:
  • IBM Security Directory Integrator
  • IBM Security Verify Directory Integrator
Versions: 7.2.0 and 10.0.0 specifically
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the web UI. Both products in their specified versions are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, gain full control of the system, and potentially pivot to connected directory services and applications.

🟠

Likely Case

Authenticated users could embed malicious scripts that steal session cookies or credentials from other users accessing the compromised interface.

🟢

If Mitigated

With proper input validation and output encoding, the risk is limited to authenticated users who would need to bypass additional security controls.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to the web interface. The vulnerability is in the stored XSS mechanism, making it persistent across sessions.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply interim fix or upgrade as specified in IBM advisory

Vendor Advisory: https://www.ibm.com/support/pages/node/7161448

Restart Required: Yes

Instructions:

1. Review IBM advisory at the provided URL. 2. Apply the recommended interim fix or upgrade to a patched version. 3. Restart the affected services. 4. Verify the fix by testing XSS payloads.

🔧 Temporary Workarounds

Input Validation Enhancement

all

Implement additional input validation and output encoding for user-supplied content in the web UI

Content Security Policy

all

Implement strict Content Security Policy headers to limit script execution

🧯 If You Can't Patch

  • Restrict access to the web UI to only trusted, authenticated users with minimal privileges
  • Implement web application firewall rules to detect and block XSS payloads

🔍 How to Verify

Check if Vulnerable:

Check if running IBM Security Directory Integrator 7.2.0 or IBM Security Verify Directory Integrator 10.0.0. Test by attempting to inject basic XSS payloads into web UI input fields.

Check Version:

Check product documentation or administrative interface for version information

Verify Fix Applied:

After applying patches, test with XSS payloads to ensure they are properly sanitized and do not execute. Verify version is no longer vulnerable.

📡 Detection & Monitoring

Log Indicators:

  • Unusual JavaScript or script-like content in user input fields
  • Multiple failed login attempts followed by successful authentication

Network Indicators:

  • Suspicious outbound connections from the server after user interaction with the web UI

SIEM Query:

source="ibm_sdi_logs" AND (message="*script*" OR message="*javascript*" OR message="*<script>*")

🔗 References

📤 Share & Export