CVE-2024-46336

6.1 MEDIUM

📋 TL;DR

Kashipara School Management System 1.0 contains a cross-site scripting (XSS) vulnerability in the feedback.php endpoint that allows attackers to inject malicious scripts. This affects all users of the vulnerable system version, potentially compromising user sessions and data. The vulnerability requires user interaction to trigger but can lead to account takeover or data theft.

💻 Affected Systems

Products:
  • Kashipara School Management System
Versions: 1.0
Operating Systems: Any OS running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the /client_user/feedback.php endpoint specifically. Requires PHP environment with the vulnerable code installed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, compromise the entire system, exfiltrate sensitive student/parent data, or deploy ransomware through malicious scripts.

🟠

Likely Case

Session hijacking of regular users, defacement of feedback pages, or credential theft through phishing-style attacks.

🟢

If Mitigated

Limited to minor page defacement or temporary session disruption if proper input validation and output encoding are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user interaction (visiting a malicious link or page). The vulnerability is in a client-facing endpoint, making it accessible to attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

1. Download the latest version from Kashipara if available. 2. Replace the vulnerable feedback.php file. 3. Implement input validation and output encoding in all user-input fields.

🔧 Temporary Workarounds

Input Validation and Sanitization

all

Add server-side validation to sanitize all user inputs in feedback.php

Modify feedback.php to include: htmlspecialchars($_POST['input_field'], ENT_QUOTES, 'UTF-8')

Content Security Policy (CSP)

all

Implement CSP headers to restrict script execution

Add to .htaccess: Header set Content-Security-Policy "default-src 'self'; script-src 'self'"
Or add to PHP: header("Content-Security-Policy: default-src 'self'; script-src 'self'");

🧯 If You Can't Patch

  • Disable or restrict access to /client_user/feedback.php endpoint
  • Implement web application firewall (WAF) rules to block XSS payloads

🔍 How to Verify

Check if Vulnerable:

Test the feedback.php endpoint with XSS payloads like <script>alert('XSS')</script> and check if script executes

Check Version:

Check the system version in admin panel or review source code comments

Verify Fix Applied:

Retest with XSS payloads after applying fixes to ensure scripts are properly sanitized and don't execute

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to feedback.php with script tags
  • Multiple failed feedback submissions with suspicious payloads

Network Indicators:

  • HTTP requests containing <script> tags or javascript: protocols to feedback.php

SIEM Query:

source="web_logs" AND uri="/client_user/feedback.php" AND (body="<script>" OR body="javascript:")

🔗 References

📤 Share & Export