CVE-2024-33298
📋 TL;DR
Microweber v2.0.9 contains a cross-site scripting (XSS) vulnerability in the backup creation function that allows remote attackers to inject malicious scripts. This affects administrators who access the vulnerable /admin/module/view?type=admin__backup endpoint. Successful exploitation could lead to session hijacking or unauthorized actions.
💻 Affected Systems
- Microweber
📦 What is this software?
Microweber by Microweber
⚠️ Risk & Real-World Impact
Worst Case
Attacker gains administrative privileges, compromises the entire Microweber installation, and potentially accesses underlying server resources.
Likely Case
Attacker steals administrator session cookies, performs unauthorized actions within the admin panel, or defaces the website.
If Mitigated
Script execution is blocked by browser security features or content security policies, limiting impact to the specific admin session.
🎯 Exploit Status
Exploitation requires authenticated admin access. The GitHub reference shows proof-of-concept details.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: v2.0.10 or later
Vendor Advisory: https://github.com/microweber/microweber
Restart Required: No
Instructions:
1. Backup your Microweber installation. 2. Update to Microweber v2.0.10 or later via the admin panel or manual download. 3. Verify the update completed successfully.
🔧 Temporary Workarounds
Restrict Admin Access
allLimit access to the admin panel to trusted IP addresses only
# Example for Apache: RewriteEngine On
RewriteCond %{REMOTE_ADDR} !^192\.168\.1\.
RewriteRule ^admin/ - [F,L]
# Example for Nginx: location /admin { allow 192.168.1.0/24; deny all; }
Disable Backup Module
linuxTemporarily disable the vulnerable backup module
# Rename or remove the backup module directory
mv /path/to/microweber/userfiles/modules/admin/backup /path/to/microweber/userfiles/modules/admin/backup.disabled
🧯 If You Can't Patch
- Implement strict Content Security Policy (CSP) headers to prevent script execution
- Require multi-factor authentication for admin accounts
🔍 How to Verify
Check if Vulnerable:
Check if Microweber version is exactly 2.0.9 and the /admin/module/view?type=admin__backup endpoint exists
Check Version:
php -r "include 'config/microweber.php'; echo MW_VERSION;"
Verify Fix Applied:
Confirm version is 2.0.10 or later and test the backup endpoint with XSS payloads
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to /admin/module/view with script tags in parameters
- Multiple failed admin login attempts followed by backup module access
Network Indicators:
- HTTP requests containing <script> tags in URL parameters to admin backup endpoint
- Unexpected outbound connections from admin session
SIEM Query:
source="web_access.log" AND uri_path="/admin/module/view" AND (query_string="*<script>*" OR query_string="*javascript:*")