CVE-2024-34058
📋 TL;DR
CVE-2024-34058 is a stored cross-site scripting (XSS) vulnerability in the WebTop package for NethServer 7 and 8. It allows attackers to inject malicious scripts via input fields like email Subject, which execute when other users view the content. This affects all NethServer installations using the vulnerable WebTop package.
💻 Affected Systems
- NethServer WebTop package
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Attackers could steal session cookies, perform actions as authenticated users, redirect to malicious sites, or install malware on client systems.
Likely Case
Session hijacking, credential theft, or unauthorized actions within the WebTop interface by authenticated attackers.
If Mitigated
Limited impact with proper input validation, output encoding, and Content Security Policy (CSP) headers in place.
🎯 Exploit Status
Exploitation requires ability to create/modify content (e.g., send emails) that other users will view.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check vendor advisory for specific patched versions
Vendor Advisory: http://www.openwall.com/lists/oss-security/2024/05/16/3
Restart Required: Yes
Instructions:
1. Update NethServer to latest version. 2. Update WebTop package via package manager. 3. Restart affected services.
🔧 Temporary Workarounds
Implement Content Security Policy
linuxAdd CSP headers to restrict script execution sources
Add 'Content-Security-Policy' header to web server configuration
Disable WebTop if not needed
linuxRemove or disable the WebTop package entirely
yum remove nethserver-webtop
systemctl restart httpd
🧯 If You Can't Patch
- Implement strict input validation on all user-controllable fields
- Enable output encoding for all dynamic content in WebTop interface
🔍 How to Verify
Check if Vulnerable:
Check WebTop package version: rpm -qa | grep nethserver-webtop
Check Version:
rpm -q nethserver-webtop --queryformat '%{VERSION}-%{RELEASE}\n'
Verify Fix Applied:
Verify updated package version and test XSS payloads no longer execute
📡 Detection & Monitoring
Log Indicators:
- Unusual script tags in email subjects or content
- Multiple failed XSS attempts in web logs
Network Indicators:
- Suspicious JavaScript payloads in HTTP requests to WebTop endpoints
SIEM Query:
source="web_logs" AND ("<script>" OR "javascript:" OR "onerror=" OR "onload=") AND uri="/webtop/*"
🔗 References
- http://seclists.org/fulldisclosure/2024/May/27
- http://www.openwall.com/lists/oss-security/2024/05/16/3
- https://www.openwall.com/lists/oss-security/2024/05/16/3
- http://seclists.org/fulldisclosure/2024/May/27
- http://www.openwall.com/lists/oss-security/2024/05/16/3
- https://www.openwall.com/lists/oss-security/2024/05/16/3