CVE-2024-3792

4.8 MEDIUM

📋 TL;DR

This is a stored Cross-Site Scripting (XSS) vulnerability in WBSAirback 21.02.04 that allows attackers to inject malicious scripts through the DeviceReplication interface. When exploited, it enables session hijacking by stealing authentication cookies or other sensitive data from authenticated administrators. Only organizations using the vulnerable WBSAirback version are affected.

💻 Affected Systems

Products:
  • WBSAirback
Versions: 21.02.04
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires administrative access to the DeviceReplication interface for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of administrative accounts leading to data theft, system manipulation, or lateral movement within the network.

🟠

Likely Case

Session hijacking allowing unauthorized access to administrative functions and potential data exposure.

🟢

If Mitigated

Limited impact with proper input validation and output encoding in place.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to the admin interface and victim interaction with malicious content.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 21.02.05 or later

Vendor Advisory: https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-wbsairback-white-bear-solutions

Restart Required: Yes

Instructions:

1. Backup current configuration. 2. Download and install WBSAirback 21.02.05 or later from official vendor sources. 3. Restart the WBSAirback service. 4. Verify the update was successful.

🔧 Temporary Workarounds

Input Validation Enhancement

linux

Implement strict input validation for the DeviceReplication execution range field

# Modify application code to sanitize user input in /admin/DeviceReplication

Output Encoding

linux

Apply proper output encoding for all user-controlled data displayed in the interface

# Implement HTML entity encoding for all dynamic content

🧯 If You Can't Patch

  • Restrict access to the /admin/DeviceReplication interface using network segmentation or firewall rules
  • Implement Content Security Policy (CSP) headers to mitigate XSS impact

🔍 How to Verify

Check if Vulnerable:

Check if running WBSAirback version 21.02.04 by examining the version in the admin interface or configuration files

Check Version:

grep -i version /opt/wbsairback/config/*.conf || cat /opt/wbsairback/VERSION.txt

Verify Fix Applied:

Verify the version has been updated to 21.02.05 or later and test the DeviceReplication interface with safe payloads

📡 Detection & Monitoring

Log Indicators:

  • Unusual JavaScript payloads in DeviceReplication logs
  • Multiple failed authentication attempts followed by successful admin login

Network Indicators:

  • HTTP requests containing script tags or JavaScript code to /admin/DeviceReplication
  • Unexpected outbound connections from the WBSAirback server

SIEM Query:

source="wbsairback.logs" AND (uri="/admin/DeviceReplication" AND (content="<script>" OR content="javascript:"))

🔗 References

📤 Share & Export