CVE-2024-37396

5.4 MEDIUM

📋 TL;DR

This stored XSS vulnerability in REDCap's Calendar function allows authenticated users to inject malicious scripts into calendar event notes. When other users view these events, the scripts execute in their browser context. All REDCap instances running version 13.1.9 or earlier with the Calendar feature enabled are affected.

💻 Affected Systems

Products:
  • REDCap
Versions: 13.1.9 and earlier
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Calendar module to be enabled and user authentication. The vulnerability exists in the Notes field of calendar events.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, redirect users to malicious sites, perform actions on behalf of authenticated users, or deploy malware through the compromised REDCap instance.

🟠

Likely Case

Authenticated attackers could steal other users' session tokens, perform unauthorized actions, or deface calendar entries with malicious content.

🟢

If Mitigated

With proper input validation and output encoding, malicious scripts would be rendered harmless as plain text rather than executable code.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access. Trustwave's advisory includes technical details and payload examples that could be weaponized.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 14.2.1 or later

Vendor Advisory: https://www.evms.edu/research/resources_services/redcap/redcap_change_log/

Restart Required: Yes

Instructions:

1. Backup your REDCap database and files. 2. Download REDCap version 14.2.1 or later from the official Vanderbilt REDCap website. 3. Follow the REDCap upgrade instructions for your specific deployment. 4. Verify the Calendar function works correctly after upgrade.

🔧 Temporary Workarounds

Disable Calendar Module

all

Temporarily disable the Calendar function to prevent exploitation while planning upgrade

Input Validation Filter

all

Implement web application firewall rules or input validation to block script tags in calendar notes

🧯 If You Can't Patch

  • Implement strict Content Security Policy (CSP) headers to prevent script execution
  • Enable audit logging for calendar events and monitor for suspicious note content

🔍 How to Verify

Check if Vulnerable:

Check REDCap version via Control Center > Configuration Check. If version is 13.1.9 or earlier, the system is vulnerable.

Check Version:

Check Control Center > Configuration Check in REDCap web interface

Verify Fix Applied:

After upgrading to 14.2.1 or later, test by attempting to inject script tags into calendar event notes - they should be properly sanitized.

📡 Detection & Monitoring

Log Indicators:

  • Unusual calendar event creation/modification patterns
  • Calendar notes containing script tags or JavaScript code

Network Indicators:

  • Unexpected outbound connections from REDCap server when viewing calendar events

SIEM Query:

source="redcap_logs" AND (event="calendar_note_update" AND message="*<script>*")

🔗 References

📤 Share & Export