CVE-2024-43481

6.5 MEDIUM

📋 TL;DR

This vulnerability allows attackers to inject malicious scripts into Power BI Report Server, enabling cross-site scripting (XSS) attacks. It affects organizations running vulnerable versions of Power BI Report Server, potentially allowing attackers to steal user credentials or session cookies. The vulnerability requires user interaction to be exploited.

💻 Affected Systems

Products:
  • Microsoft Power BI Report Server
Versions: All versions before the May 2024 security update
Operating Systems: Windows Server
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Power BI Report Server to be configured and accessible to users. The vulnerability is in the web interface component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, hijack user sessions, perform actions on behalf of authenticated users, or redirect users to malicious sites.

🟠

Likely Case

Attackers would typically use this to steal user session cookies or credentials through phishing-style attacks, potentially gaining unauthorized access to Power BI reports and data.

🟢

If Mitigated

With proper input validation and output encoding, the impact is limited to minor UI manipulation without data compromise.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user interaction (clicking a malicious link) and some level of social engineering. The vulnerability is in the web interface where user input is not properly sanitized.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: May 2024 security update for Power BI Report Server

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43481

Restart Required: Yes

Instructions:

1. Download the May 2024 security update for Power BI Report Server from Microsoft Update Catalog. 2. Apply the update to all Power BI Report Server instances. 3. Restart the Power BI Report Server service. 4. Verify the update was successful by checking the version.

🔧 Temporary Workarounds

Implement Content Security Policy (CSP)

all

Add Content Security Policy headers to restrict script execution sources

Add 'Content-Security-Policy' header with appropriate directives in web server configuration

Input Validation Enhancement

windows

Implement additional input validation for user-supplied data in Power BI reports

Configure input validation rules in Power BI Report Server settings

🧯 If You Can't Patch

  • Implement strict Content Security Policy (CSP) headers to prevent script injection
  • Use web application firewall (WAF) rules to detect and block XSS payloads

🔍 How to Verify

Check if Vulnerable:

Check Power BI Report Server version against the May 2024 security update version. If running a version before the May 2024 update, the system is vulnerable.

Check Version:

Check the version in Power BI Report Server web portal under Help > About, or query the server configuration database.

Verify Fix Applied:

Verify that the Power BI Report Server version matches or exceeds the May 2024 security update version. Test report rendering with various inputs to ensure proper sanitization.

📡 Detection & Monitoring

Log Indicators:

  • Unusual report access patterns
  • Multiple failed login attempts following report access
  • Suspicious user agent strings in web logs

Network Indicators:

  • HTTP requests containing suspicious script tags or JavaScript payloads
  • Unusual outbound connections from Power BI Report Server

SIEM Query:

source="PowerBI_Server" AND (http_request CONTAINS "<script>" OR http_request CONTAINS "javascript:" OR http_request CONTAINS "onerror=" OR http_request CONTAINS "onload=")

🔗 References

📤 Share & Export