CVE-2024-46073

6.1 MEDIUM

📋 TL;DR

A reflected Cross-Site Scripting (XSS) vulnerability in IceHRM v32.4.0.OS allows attackers to execute arbitrary JavaScript in users' browsers by tricking them into visiting malicious URLs. This affects all users accessing the vulnerable login page, potentially leading to session hijacking or credential theft.

💻 Affected Systems

Products:
  • IceHRM
Versions: v32.4.0.OS
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the login page via the 'next' parameter. Earlier versions may also be vulnerable but not confirmed.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker steals administrator session cookies, gains full system access, and potentially compromises the entire HR database including sensitive employee information.

🟠

Likely Case

Attacker steals user session cookies to impersonate legitimate users, accesses sensitive HR data, or performs unauthorized actions within the application.

🟢

If Mitigated

With proper Content Security Policy (CSP) headers and input validation, impact is limited to temporary session compromise for individual users.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction (clicking malicious link) but is trivial to weaponize in phishing campaigns.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: Not available

Restart Required: No

Instructions:

1. Check GitHub repository for updates
2. Apply proper output encoding for the 'next' parameter
3. Implement Content Security Policy headers
4. Validate and sanitize all user inputs

🔧 Temporary Workarounds

Web Application Firewall (WAF) Rule

all

Block requests containing malicious scripts in the 'next' parameter

WAF-specific configuration required

Content Security Policy Implementation

all

Add CSP headers to restrict script execution

Content-Security-Policy: script-src 'self'

🧯 If You Can't Patch

  • Implement strict Content Security Policy headers to prevent script execution
  • Deploy web application firewall with XSS detection rules

🔍 How to Verify

Check if Vulnerable:

Test by accessing: /login?next=javascript:alert('XSS') and check if script executes

Check Version:

Check IceHRM version in admin panel or application footer

Verify Fix Applied:

Verify the 'next' parameter is properly URL-encoded and scripts do not execute

📡 Detection & Monitoring

Log Indicators:

  • Unusual 'next' parameter values in login requests
  • Multiple failed login attempts with suspicious parameters

Network Indicators:

  • HTTP requests with javascript: or script tags in URL parameters

SIEM Query:

source="web_logs" AND uri_query="*javascript:*" OR uri_query="*<script>*"

🔗 References

📤 Share & Export