CVE-2024-41753

6.1 MEDIUM

📋 TL;DR

This cross-site scripting vulnerability in IBM Cloud Pak for Business Automation allows unauthenticated attackers to inject malicious JavaScript into the web interface. This could lead to credential theft or session hijacking when users interact with the compromised interface. Organizations running affected versions of IBM Cloud Pak for Business Automation are at risk.

💻 Affected Systems

Products:
  • IBM Cloud Pak for Business Automation
Versions: 24.0.0 through 24.0.0 IF004 and 24.0.1 through 24.0.1 IF001
Operating Systems: All platforms running affected IBM Cloud Pak versions
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments of affected versions are vulnerable by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers steal administrator credentials, gain full system access, and potentially compromise the entire business automation environment.

🟠

Likely Case

Session hijacking leading to unauthorized access to business automation data and functionality.

🟢

If Mitigated

Limited impact with proper input validation and output encoding controls in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

XSS vulnerabilities typically have low exploitation complexity, especially when unauthenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply IBM Cloud Pak for Business Automation 24.0.0 IF005 or 24.0.1 IF002

Vendor Advisory: https://www.ibm.com/support/pages/node/7232197

Restart Required: Yes

Instructions:

1. Download the appropriate fix pack from IBM Fix Central. 2. Follow IBM's installation instructions for applying fix packs to Cloud Pak for Business Automation. 3. Restart affected services.

🔧 Temporary Workarounds

Web Application Firewall (WAF)

all

Deploy a WAF with XSS protection rules to filter malicious input.

Content Security Policy

all

Implement strict CSP headers to restrict script execution.

🧯 If You Can't Patch

  • Restrict network access to only trusted IP addresses
  • Implement strong authentication and session management controls

🔍 How to Verify

Check if Vulnerable:

Check IBM Cloud Pak version via administrative console or command line interface.

Check Version:

oc get pods -n <namespace> | grep automation

Verify Fix Applied:

Verify version is updated to 24.0.0 IF005 or 24.0.1 IF002 or later.

📡 Detection & Monitoring

Log Indicators:

  • Unusual JavaScript payloads in web request logs
  • Suspicious user agent strings

Network Indicators:

  • HTTP requests containing script tags or JavaScript code in parameters

SIEM Query:

web_request contains "<script>" OR web_request contains "javascript:"

🔗 References

📤 Share & Export