CVE-2024-41502

6.1 MEDIUM

📋 TL;DR

Jetimob Plataforma Imobiliaria 20240627-0 contains a stored cross-site scripting (XSS) vulnerability in the 'Observaces' field when creating or editing person records. This allows attackers to inject malicious scripts that execute in victims' browsers when viewing affected records. Organizations using this specific version of Jetimob's real estate platform are affected.

💻 Affected Systems

Products:
  • Jetimob Plataforma Imobiliaria
Versions: 20240627-0
Operating Systems: Any
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the specific version mentioned; requires access to create/edit person records.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, perform actions as authenticated users, redirect to malicious sites, or install malware on user systems.

🟠

Likely Case

Session hijacking, credential theft, defacement of application pages, or redirection to phishing sites.

🟢

If Mitigated

Limited impact with proper input validation, output encoding, and Content Security Policy (CSP) headers in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to create/edit person records; proof-of-concept available on GitHub.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: http://jetimob.com

Restart Required: No

Instructions:

Check vendor website for updates; no official patch information available at this time.

🔧 Temporary Workarounds

Input Validation and Sanitization

all

Implement server-side validation and sanitization of the 'Observaces' field to remove or encode HTML/JavaScript content.

Content Security Policy

all

Implement strict CSP headers to prevent execution of inline scripts and restrict script sources.

🧯 If You Can't Patch

  • Restrict access to person creation/editing functions to trusted users only
  • Implement web application firewall (WAF) rules to block XSS payloads in the 'Observaces' parameter

🔍 How to Verify

Check if Vulnerable:

Test by entering XSS payloads like <script>alert('XSS')</script> in the 'Observaces' field when creating/editing a person record.

Check Version:

Check application version in admin panel or configuration files; specific version 20240627-0 is vulnerable.

Verify Fix Applied:

Verify that XSS payloads are properly sanitized or encoded when displayed, and that scripts do not execute.

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTML/JavaScript patterns in 'Observaces' field submissions
  • Multiple failed XSS attempts in input fields

Network Indicators:

  • Script tags or JavaScript code in POST requests to person creation/editing endpoints

SIEM Query:

search 'Observaces' AND ('<script>' OR 'javascript:' OR 'onload=' OR 'onerror=') in web application logs

🔗 References

📤 Share & Export