CVE-2024-38493

6.1 MEDIUM

📋 TL;DR

A reflected cross-site scripting (XSS) vulnerability in the PAM UI web interface allows remote attackers to execute arbitrary JavaScript in users' browsers by tricking them into clicking malicious links. This affects organizations using Broadcom's PAM solution with vulnerable versions of the web interface. The vulnerability enables client-side code execution but requires user interaction.

💻 Affected Systems

Products:
  • Broadcom Privileged Access Manager (PAM)
Versions: Specific versions not detailed in advisory; check Broadcom security advisory for exact affected versions
Operating Systems: All platforms running PAM web interface
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the web interface component; all deployments with web UI enabled are affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker steals PAM administrator credentials, accesses sensitive privileged accounts, and potentially moves laterally through the network.

🟠

Likely Case

Attacker steals session cookies or authentication tokens, leading to unauthorized access to the PAM system and potentially other connected systems.

🟢

If Mitigated

Limited to session hijacking for the targeted user only, with no further network access due to proper segmentation and monitoring.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user interaction (clicking malicious link) and knowledge of the PAM UI URL structure.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Broadcom advisory for specific patched versions

Vendor Advisory: https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24678

Restart Required: Yes

Instructions:

1. Review Broadcom security advisory 24678. 2. Download and apply the appropriate patch for your PAM version. 3. Restart PAM services. 4. Verify the fix by testing XSS payloads.

🔧 Temporary Workarounds

Implement Content Security Policy (CSP)

all

Add CSP headers to restrict script execution sources

Add 'Content-Security-Policy: default-src 'self'; script-src 'self'' to web server headers

Input Validation Filtering

all

Implement server-side input validation for URL parameters

Configure web application firewall to filter XSS patterns in URL parameters

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate PAM UI from user workstations
  • Deploy web application firewall with XSS protection rules in front of PAM interface

🔍 How to Verify

Check if Vulnerable:

Test by injecting basic XSS payloads into URL parameters of PAM UI and checking if they execute

Check Version:

Check PAM administration console or documentation for version information

Verify Fix Applied:

After patching, retest with same XSS payloads to confirm they no longer execute

📡 Detection & Monitoring

Log Indicators:

  • Unusual long URLs with script tags in web server logs
  • Multiple failed login attempts following suspicious URL access

Network Indicators:

  • HTTP requests containing script tags or JavaScript in URL parameters to PAM UI endpoints

SIEM Query:

source="pam_web_logs" AND (url="*<script>*" OR url="*javascript:*")

🔗 References

📤 Share & Export