CVE-2024-30889

5.4 MEDIUM

📋 TL;DR

This is a reflected Cross-Site Scripting (XSS) vulnerability in audimexEE software that allows attackers to inject malicious scripts via multiple parameters. When exploited, it can enable arbitrary code execution in victims' browsers. Organizations using audimexEE versions 15.1.2 and earlier are affected.

💻 Affected Systems

Products:
  • audimexEE
Versions: v.15.1.2 and earlier
Operating Systems: All platforms running audimexEE
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in multiple parameters (service, method, widget_type, request_id, payload) making various entry points exploitable

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete account takeover, session hijacking, or malware deployment through browser-based code execution

🟠

Likely Case

Session theft, credential harvesting, or defacement of the application interface

🟢

If Mitigated

Limited impact with proper input validation and output encoding in place

🌐 Internet-Facing: HIGH - Web applications with exposed parameters are directly vulnerable to reflected XSS attacks
🏢 Internal Only: MEDIUM - Internal users could still be targeted through phishing or compromised internal systems

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept available on GitHub demonstrates exploitation via URL parameters

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 15.1.3.9

Vendor Advisory: Not provided in references

Restart Required: Yes

Instructions:

1. Download audimexEE version 15.1.3.9 or later from official vendor
2. Backup current installation and configuration
3. Apply the update following vendor's upgrade procedures
4. Restart the application service
5. Verify the fix by testing previously vulnerable parameters

🔧 Temporary Workarounds

Web Application Firewall (WAF) Rules

all

Implement WAF rules to block malicious input patterns in the vulnerable parameters

# Example ModSecurity rule: SecRule ARGS "<script" "id:1001,phase:2,deny,status:403,msg:'XSS Attack Detected'"
# Block patterns containing javascript: or onload= in parameters

Input Validation Filter

all

Implement server-side input validation for service, method, widget_type, request_id, and payload parameters

# PHP example: $clean_input = htmlspecialchars($_GET['parameter'], ENT_QUOTES, 'UTF-8');
# Python example: import html; safe_input = html.escape(user_input)

🧯 If You Can't Patch

  • Implement Content Security Policy (CSP) headers to restrict script execution
  • Deploy reverse proxy with input sanitization for vulnerable parameters

🔍 How to Verify

Check if Vulnerable:

Test by injecting simple XSS payloads into service, method, widget_type, request_id, or payload parameters and checking if they execute

Check Version:

Check application version in admin interface or configuration files

Verify Fix Applied:

Attempt the same XSS payloads after patching; they should be properly encoded or rejected

📡 Detection & Monitoring

Log Indicators:

  • Unusual parameter values containing script tags or JavaScript code
  • Multiple failed requests with suspicious parameter patterns
  • Requests to vulnerable endpoints with encoded payloads

Network Indicators:

  • HTTP requests with script tags in query parameters
  • Unusual traffic patterns to specific endpoints with parameter manipulation

SIEM Query:

source="web_logs" AND (uri="*<script*" OR uri="*javascript:*" OR uri="*onload=*")

🔗 References

📤 Share & Export