CVE-2024-34058

8.8 HIGH

📋 TL;DR

CVE-2024-34058 is a stored cross-site scripting (XSS) vulnerability in the WebTop package for NethServer 7 and 8. It allows attackers to inject malicious scripts via input fields like email Subject, which execute when other users view the content. This affects all NethServer installations using the vulnerable WebTop package.

💻 Affected Systems

Products:
  • NethServer WebTop package
Versions: NethServer 7 and 8 with vulnerable WebTop versions
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WebTop package to be installed and accessible to users.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, perform actions as authenticated users, redirect to malicious sites, or install malware on client systems.

🟠

Likely Case

Session hijacking, credential theft, or unauthorized actions within the WebTop interface by authenticated attackers.

🟢

If Mitigated

Limited impact with proper input validation, output encoding, and Content Security Policy (CSP) headers in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires ability to create/modify content (e.g., send emails) that other users will view.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched versions

Vendor Advisory: http://www.openwall.com/lists/oss-security/2024/05/16/3

Restart Required: Yes

Instructions:

1. Update NethServer to latest version. 2. Update WebTop package via package manager. 3. Restart affected services.

🔧 Temporary Workarounds

Implement Content Security Policy

linux

Add CSP headers to restrict script execution sources

Add 'Content-Security-Policy' header to web server configuration

Disable WebTop if not needed

linux

Remove or disable the WebTop package entirely

yum remove nethserver-webtop
systemctl restart httpd

🧯 If You Can't Patch

  • Implement strict input validation on all user-controllable fields
  • Enable output encoding for all dynamic content in WebTop interface

🔍 How to Verify

Check if Vulnerable:

Check WebTop package version: rpm -qa | grep nethserver-webtop

Check Version:

rpm -q nethserver-webtop --queryformat '%{VERSION}-%{RELEASE}\n'

Verify Fix Applied:

Verify updated package version and test XSS payloads no longer execute

📡 Detection & Monitoring

Log Indicators:

  • Unusual script tags in email subjects or content
  • Multiple failed XSS attempts in web logs

Network Indicators:

  • Suspicious JavaScript payloads in HTTP requests to WebTop endpoints

SIEM Query:

source="web_logs" AND ("<script>" OR "javascript:" OR "onerror=" OR "onload=") AND uri="/webtop/*"

🔗 References

📤 Share & Export