CVE-2024-33985

7.1 HIGH

📋 TL;DR

This is a Cross-Site Scripting (XSS) vulnerability in School Attendance Monitoring System and School Event Management System version 1.0. An attacker can craft malicious URLs containing JavaScript in the 'View' parameter, which when visited by a victim could steal session cookies or perform actions as the victim. This affects all users of these systems.

💻 Affected Systems

Products:
  • School Attendance Monitoring System
  • School Event Management System
Versions: 1.0
Operating Systems: Any
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the '/course/index.php' endpoint specifically through the 'View' parameter.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker steals administrator session cookies, gains full system access, modifies student records, creates fake events, or installs backdoors.

🟠

Likely Case

Attacker steals user session cookies to impersonate teachers or students, potentially modifying attendance records or accessing sensitive information.

🟢

If Mitigated

With proper input validation and output encoding, the malicious script would be neutralized before execution.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

XSS vulnerabilities are commonly weaponized. The exploit requires sending a crafted URL to a victim.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products

Restart Required: No

Instructions:

No official patch available. Consider implementing workarounds or migrating to a different system.

🔧 Temporary Workarounds

Input Validation Filter

all

Add server-side validation to sanitize the 'View' parameter in '/course/index.php' to allow only expected values.

Edit '/course/index.php' to add: $view = filter_var($_GET['View'], FILTER_SANITIZE_STRING);

Output Encoding

all

Apply HTML entity encoding to the 'View' parameter before outputting it in the page.

In PHP: echo htmlspecialchars($view, ENT_QUOTES, 'UTF-8');

🧯 If You Can't Patch

  • Implement a Web Application Firewall (WAF) with XSS protection rules to block malicious requests.
  • Disable or restrict access to '/course/index.php' if not essential, or move system behind authentication.

🔍 How to Verify

Check if Vulnerable:

Test by accessing '/course/index.php?View=<script>alert('XSS')</script>' and check if script executes.

Check Version:

Check system documentation or admin panel for version information.

Verify Fix Applied:

Retest with the same payload; script should not execute and should be displayed as plain text.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to '/course/index.php' with 'View' parameter containing script tags or JavaScript keywords.

Network Indicators:

  • Unusual outbound connections from the system after visiting crafted URLs.

SIEM Query:

source="web_logs" AND uri="/course/index.php" AND query="*View=*script*"

🔗 References

📤 Share & Export