CVE-2024-45753

6.1 MEDIUM

📋 TL;DR

This vulnerability allows cross-site scripting (XSS) attacks in Mahara's external RSS feed block. Attackers can inject malicious scripts via manipulated RSS feed XML link attributes, which execute in users' browsers when viewing the feed. Users of Mahara 23.04.8 and 24.04.4 are affected.

💻 Affected Systems

Products:
  • Mahara
Versions: 23.04.8 and 24.04.4
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists when using the external RSS feed block feature with untrusted RSS feeds.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, perform actions as authenticated users, or redirect users to malicious sites, potentially compromising user accounts and sensitive data.

🟠

Likely Case

Attackers inject malicious JavaScript to steal session cookies or credentials from users viewing compromised RSS feeds.

🟢

If Mitigated

With proper input validation and output encoding, malicious scripts would be neutralized before execution.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires ability to control or manipulate RSS feed XML content that Mahara processes.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 23.04.8 and 24.04.4

Vendor Advisory: https://mahara.org/interaction/forum/topic.php?id=9594

Restart Required: No

Instructions:

1. Upgrade Mahara to latest patched version. 2. Apply vendor security patches if available. 3. Verify the external RSS feed block properly sanitizes link attributes.

🔧 Temporary Workarounds

Disable External RSS Feed Block

all

Temporarily disable or remove the vulnerable external RSS feed block from Mahara installations.

Restrict RSS Feed Sources

all

Only allow trusted, verified RSS feed sources that cannot be manipulated by attackers.

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to detect and block XSS payloads in RSS feed data
  • Monitor for suspicious activity related to RSS feed processing and user session anomalies

🔍 How to Verify

Check if Vulnerable:

Check Mahara version in admin interface or via version.php file. If version is exactly 23.04.8 or 24.04.4, system is vulnerable.

Check Version:

Check Mahara version in admin panel or examine version.php file in installation directory.

Verify Fix Applied:

After patching, test RSS feed functionality with safe test payloads to ensure proper sanitization.

📡 Detection & Monitoring

Log Indicators:

  • Unusual RSS feed processing errors
  • Multiple failed RSS feed fetch attempts
  • Suspicious user agent strings in RSS feed requests

Network Indicators:

  • Unusual outbound connections from Mahara server to unknown RSS feed sources
  • Patterns of RSS feed requests containing script tags or JavaScript

SIEM Query:

Search for web server logs containing 'rss', 'feed', or 'xml' with suspicious characters like <script> or javascript: in query parameters or POST data.

🔗 References

📤 Share & Export