CVE-2024-28979

5.1 MEDIUM

📋 TL;DR

Dell OpenManage Enterprise versions 4.1.0 and older contain a cross-site scripting (XSS) vulnerability that allows high-privileged attackers with remote access to inject malicious scripts into web pages. This could lead to session hijacking, data theft, or unauthorized actions when users view compromised pages. Only administrators with valid credentials can exploit this vulnerability.

💻 Affected Systems

Products:
  • Dell OpenManage Enterprise
Versions: 4.1.0 and older
Operating Systems: Windows Server, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires attacker to have valid administrative credentials and network access to the OpenManage Enterprise web interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker could steal administrator session cookies, gain full control of the OpenManage Enterprise console, and potentially pivot to managed systems.

🟠

Likely Case

Attackers with valid credentials could inject scripts to steal session data or perform unauthorized actions within the management interface.

🟢

If Mitigated

With proper access controls and network segmentation, impact is limited to the management interface without affecting managed systems.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated administrative access to the web interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.2.0 or later

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000224642/dsa-2024-202-security-update-for-dell-openmanage-enterprise-vulnerability

Restart Required: Yes

Instructions:

1. Download OpenManage Enterprise version 4.2.0 or later from Dell Support. 2. Backup current configuration. 3. Install the update following Dell's upgrade documentation. 4. Restart the OpenManage Enterprise service or server.

🔧 Temporary Workarounds

Restrict Network Access

all

Limit access to OpenManage Enterprise web interface to trusted administrative networks only

Configure firewall rules to restrict access to OpenManage Enterprise ports (typically 443/TCP)

Implement Web Application Firewall

all

Deploy WAF with XSS protection rules to filter malicious input

Configure WAF rules to detect and block XSS payloads in HTTP requests

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate OpenManage Enterprise from untrusted networks
  • Enforce strong authentication policies and monitor for suspicious administrative activity

🔍 How to Verify

Check if Vulnerable:

Check OpenManage Enterprise version in the web interface under Help > About or via CLI command: omreport system summary

Check Version:

omreport system summary | grep Version

Verify Fix Applied:

Verify version is 4.2.0 or later and test XSS payloads are properly sanitized

📡 Detection & Monitoring

Log Indicators:

  • Unusual administrative login patterns
  • HTTP requests containing script tags or JavaScript in parameters

Network Indicators:

  • HTTP traffic to OpenManage Enterprise containing suspicious script payloads

SIEM Query:

source="openmanage" AND (http_uri="*<script*" OR http_body="*javascript:*")

🔗 References

📤 Share & Export