CVE-2024-47107

6.4 MEDIUM

📋 TL;DR

IBM QRadar SIEM 7.5 has a stored cross-site scripting (XSS) vulnerability that allows authenticated users to inject malicious JavaScript into the web interface. This could enable attackers to steal session credentials or perform unauthorized actions within authenticated sessions. Only authenticated users can exploit this vulnerability.

💻 Affected Systems

Products:
  • IBM QRadar SIEM
Versions: 7.5.x versions
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects QRadar SIEM 7.5; requires authenticated access to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated malicious insider or compromised account could inject JavaScript that steals administrator credentials, leading to full system compromise and data exfiltration.

🟠

Likely Case

Authenticated attackers with basic privileges could inject malicious scripts to hijack sessions, perform unauthorized actions, or steal sensitive data from other users.

🟢

If Mitigated

With proper input validation and output encoding, the risk is limited to authenticated users who would need to bypass additional security controls.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access; stored XSS means payload persists and affects multiple users.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply IBM QRadar SIEM 7.5.3 Patch 11 or later

Vendor Advisory: https://www.ibm.com/support/pages/node/7178104

Restart Required: Yes

Instructions:

1. Download the patch from IBM Fix Central. 2. Backup your QRadar configuration. 3. Apply the patch following IBM's installation guide. 4. Restart QRadar services as required.

🔧 Temporary Workarounds

Input Validation Enhancement

all

Implement additional input validation for user-controllable fields in the web interface

Content Security Policy

all

Implement strict Content Security Policy headers to limit script execution

🧯 If You Can't Patch

  • Restrict user permissions to minimize attack surface from authenticated users
  • Implement web application firewall rules to detect and block XSS payloads

🔍 How to Verify

Check if Vulnerable:

Check QRadar version via Admin > System & License Management > About QRadar

Check Version:

ssh admin@qradar-host 'cat /opt/qradar/VERSION'

Verify Fix Applied:

Verify patch installation in Admin > System & License Management > Installed Patches

📡 Detection & Monitoring

Log Indicators:

  • Unusual JavaScript injection patterns in web logs
  • Multiple failed XSS attempts

Network Indicators:

  • Suspicious JavaScript payloads in HTTP requests to QRadar

SIEM Query:

SELECT * FROM events WHERE devicetype=12 AND (UTF8(payload) LIKE '%<script>%' OR UTF8(payload) LIKE '%javascript:%')

🔗 References

📤 Share & Export