CVE-2024-35322
📋 TL;DR
MyNET up to version 26.08 contains a reflected cross-site scripting (XSS) vulnerability in the ficheiro parameter. Attackers can inject malicious scripts that execute in victims' browsers when they visit crafted URLs. This affects all users of vulnerable MyNET installations.
💻 Affected Systems
- MyNET
📦 What is this software?
Mynet by Airc
⚠️ Risk & Real-World Impact
Worst Case
Attackers steal session cookies, perform actions as authenticated users, redirect to malicious sites, or install malware via drive-by downloads.
Likely Case
Session hijacking, credential theft, or defacement of web pages through script injection.
If Mitigated
Limited impact if input validation, output encoding, and Content Security Policy are properly implemented.
🎯 Exploit Status
Exploit requires user interaction (clicking malicious link) but is trivial to craft; public exploit code is available.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: https://www.airc.pt/solucoes-servicos/solucoes?segment=MYN
Restart Required: No
Instructions:
1. Check vendor advisory for updates. 2. Upgrade to a version above 26.08 if available. 3. Apply input validation and output encoding to the ficheiro parameter.
🔧 Temporary Workarounds
Web Application Firewall (WAF) Rule
allBlock or sanitize requests containing malicious scripts in the ficheiro parameter.
WAF-specific configuration required
Input Validation Filter
allImplement server-side validation to reject or sanitize suspicious input in the ficheiro parameter.
Application-specific code implementation
🧯 If You Can't Patch
- Implement strict Content Security Policy (CSP) headers to mitigate script execution.
- Disable or restrict access to the vulnerable endpoint if not essential.
🔍 How to Verify
Check if Vulnerable:
Test by injecting a script payload into the ficheiro parameter (e.g., ?ficheiro=<script>alert('XSS')</script>) and check if it executes.
Check Version:
Check MyNET version in application interface or configuration files; specific command depends on deployment.
Verify Fix Applied:
After applying fixes, repeat the test; script should not execute and input should be sanitized or blocked.
📡 Detection & Monitoring
Log Indicators:
- HTTP requests with script tags or encoded payloads in the ficheiro parameter
- Unusual parameter values in access logs
Network Indicators:
- Malicious URLs containing script injections in ficheiro parameter
- Traffic patterns indicating XSS exploitation attempts
SIEM Query:
Example: source="web_logs" AND uri_query="*ficheiro=*script*"