CVE-2024-45642

5.3 MEDIUM

📋 TL;DR

IBM Security ReaQta 3.12 contains a cross-site scripting vulnerability that allows privileged users to inject malicious JavaScript into the web interface. This could enable attackers to steal credentials or manipulate the application within trusted sessions. Only authenticated privileged users can exploit this vulnerability.

💻 Affected Systems

Products:
  • IBM Security ReaQta
Versions: 3.12
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations running version 3.12. Requires privileged user access to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Privileged attacker steals administrator credentials, gains full system control, and potentially compromises the entire security monitoring infrastructure.

🟠

Likely Case

Privileged insider or compromised account uses XSS to steal session cookies or credentials from other administrators, leading to lateral movement within the security system.

🟢

If Mitigated

With proper input validation and output encoding, the attack surface is limited to authenticated privileged users only.

🌐 Internet-Facing: MEDIUM - While exploitation requires privileged access, internet-facing instances could be targeted through compromised accounts.
🏢 Internal Only: HIGH - Internal privileged users or compromised internal accounts can exploit this to escalate privileges or steal sensitive security data.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated privileged access. XSS payloads would need to be crafted for specific UI components.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply fix as per IBM Security Advisory

Vendor Advisory: https://www.ibm.com/support/pages/node/7172212

Restart Required: Yes

Instructions:

1. Review IBM Security Advisory 2. Apply the provided fix from IBM 3. Restart IBM Security ReaQta services 4. Verify the fix is applied

🔧 Temporary Workarounds

Input Validation Enhancement

all

Implement additional input validation for all user-controlled fields in the web interface

Content Security Policy

all

Implement strict Content Security Policy headers to limit script execution

🧯 If You Can't Patch

  • Restrict privileged user access to only essential personnel
  • Implement web application firewall rules to detect and block XSS payloads

🔍 How to Verify

Check if Vulnerable:

Check if running IBM Security ReaQta version 3.12. Review web interface for user input fields that may accept JavaScript.

Check Version:

Check IBM Security ReaQta administration interface or configuration files for version information

Verify Fix Applied:

After applying IBM's fix, test user input fields with safe XSS test payloads to ensure they are properly sanitized.

📡 Detection & Monitoring

Log Indicators:

  • Unusual JavaScript patterns in user input fields
  • Multiple failed XSS attempts from privileged accounts

Network Indicators:

  • Suspicious JavaScript payloads in HTTP requests to ReaQta web interface

SIEM Query:

source="reaqta_web_logs" AND (http_request contains "<script>" OR http_request contains "javascript:" OR http_request contains "onerror=" OR http_request contains "onload=")

🔗 References

📤 Share & Export