CVE-2024-45920

5.4 MEDIUM

📋 TL;DR

A stored cross-site scripting vulnerability in Solvait 24.4.2 allows attackers to inject malicious scripts into the 'Intrest' feature. This could enable session hijacking, credential theft, or defacement for users who view the compromised content. All users of Solvait 24.4.2 are potentially affected.

💻 Affected Systems

Products:
  • Solvait
Versions: 24.4.2
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the 'Intrest' feature specifically. Other features may not be affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, take over admin accounts, pivot to internal systems, and deploy ransomware or exfiltrate sensitive data.

🟠

Likely Case

Attackers inject malicious scripts that steal user session cookies or credentials when users view the compromised 'Intrest' content, leading to account compromise.

🟢

If Mitigated

With proper input validation and output encoding, malicious scripts are neutralized, preventing execution and limiting impact to data integrity issues.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

The GitHub gist provides proof-of-concept details. Exploitation requires the ability to submit content to the 'Intrest' feature, which typically requires authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

1. Monitor vendor channels for security updates. 2. Apply the patch when available. 3. Test in a non-production environment first.

🔧 Temporary Workarounds

Disable 'Intrest' Feature

all

Temporarily disable the vulnerable 'Intrest' feature to prevent exploitation.

# Configuration depends on Solvait deployment. Check application settings or disable via admin panel.

Implement WAF Rules

linux

Configure web application firewall rules to block XSS payloads targeting the 'Intrest' endpoint.

# Example ModSecurity rule: SecRule ARGS "<script" "id:1001,phase:2,deny,msg:'XSS Attack Detected'"

🧯 If You Can't Patch

  • Implement strict Content Security Policy (CSP) headers to mitigate script execution.
  • Enable input validation and output encoding at the application layer if source code access is available.

🔍 How to Verify

Check if Vulnerable:

Test by submitting a script payload (e.g., <script>alert('XSS')</script>) to the 'Intrest' feature and check if it executes when viewed.

Check Version:

# Check Solvait version via admin panel or configuration files. Exact command depends on deployment.

Verify Fix Applied:

After applying fixes, repeat the test payload submission and verify it does not execute; check for proper sanitization in the output.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to 'Intrest' endpoints with script tags or JavaScript code in parameters.
  • Multiple failed login attempts following 'Intrest' submissions.

Network Indicators:

  • HTTP requests containing <script> tags or JavaScript events (e.g., onload, onclick) in payloads to Solvait endpoints.

SIEM Query:

source="solvait_logs" AND (url_path="/intrest" AND (request_body LIKE "%<script>%" OR request_body LIKE "%javascript:%"))

🔗 References

📤 Share & Export