CVE-2024-43184

6.1 MEDIUM

📋 TL;DR

This cross-site scripting (XSS) vulnerability in IBM Jazz Foundation allows unauthenticated attackers to inject malicious JavaScript into the web interface. The injected code can steal user credentials and manipulate trusted sessions. Organizations using affected versions of IBM Jazz Foundation are at risk.

💻 Affected Systems

Products:
  • IBM Jazz Foundation
Versions: 7.0.2 through 7.0.2 iFix033, 7.0.3 through 7.0.3 iFix012, 7.1.0 through 7.1.0 iFix002
Operating Systems: All platforms running IBM Jazz Foundation
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments with web UI accessible are vulnerable; no special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers steal administrator credentials, gain full system access, and compromise sensitive data across the Jazz platform.

🟠

Likely Case

Attackers steal user session cookies or credentials, leading to unauthorized access to project data and potential privilege escalation.

🟢

If Mitigated

With proper input validation and output encoding, the attack surface is reduced, though some risk remains until patched.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

XSS vulnerabilities typically require minimal technical skill to exploit once the injection vector is identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply fixes beyond the affected iFix versions: 7.0.2 iFix034+, 7.0.3 iFix013+, 7.1.0 iFix003+

Vendor Advisory: https://www.ibm.com/support/pages/node/7244013

Restart Required: Yes

Instructions:

1. Download the appropriate fix from IBM Fix Central. 2. Apply the fix according to IBM's installation instructions. 3. Restart the Jazz application server. 4. Verify the fix by testing for XSS vectors.

🔧 Temporary Workarounds

Web Application Firewall (WAF)

all

Deploy a WAF with XSS protection rules to block malicious payloads.

Content Security Policy (CSP)

all

Implement strict CSP headers to restrict script execution sources.

🧯 If You Can't Patch

  • Restrict network access to Jazz web UI to trusted IP ranges only.
  • Implement additional authentication layers and monitor for suspicious user activity.

🔍 How to Verify

Check if Vulnerable:

Check your Jazz Foundation version against affected ranges in the admin console or configuration files.

Check Version:

Check the Jazz application server logs or admin interface for version information.

Verify Fix Applied:

After patching, test XSS vectors in the web UI and verify they are properly sanitized.

📡 Detection & Monitoring

Log Indicators:

  • Unusual JavaScript payloads in HTTP requests
  • Multiple failed login attempts from unexpected locations

Network Indicators:

  • Suspicious outbound connections to unknown domains after user interaction with Jazz UI

SIEM Query:

source="jazz_logs" AND (http_request CONTAINS "<script>" OR http_request CONTAINS "javascript:")

🔗 References

📤 Share & Export