CVE-2024-47226

5.4 MEDIUM

📋 TL;DR

A stored XSS vulnerability exists in NetBox 4.1.0's configuration history feature where authenticated users can inject malicious JavaScript/HTML into the 'Top banner' field. This allows attackers to execute arbitrary code in victims' browsers when they view the admin panel. The vulnerability is disputed as the banner field is designed to accept unsanitized HTML for notifications.

💻 Affected Systems

Products:
  • NetBox
Versions: 4.1.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the configuration revision banner feature in the admin panel. Disputed as not a vulnerability since the field is intended for HTML content.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated malicious user could steal admin session cookies, perform actions as other users, or redirect users to malicious sites.

🟠

Likely Case

Limited impact since exploitation requires authenticated access and the field's purpose is to display HTML, making malicious content potentially obvious.

🟢

If Mitigated

Minimal impact if proper access controls limit who can modify configuration revisions and users are trained to recognize suspicious banner content.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to the admin panel. The vulnerability is disputed by multiple parties as intended functionality.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: N/A

Vendor Advisory: N/A

Restart Required: No

Instructions:

No official patch as this is disputed as not a vulnerability. Consider upgrading to latest NetBox version for general security improvements.

🔧 Temporary Workarounds

Restrict Admin Access

all

Limit who has authenticated access to the admin panel configuration revision feature.

Monitor Banner Content

all

Regularly review configuration revision banners for suspicious HTML/JavaScript content.

🧯 If You Can't Patch

  • Implement strict access controls to limit who can modify configuration revisions.
  • Educate users to recognize and report suspicious banner content in the admin panel.

🔍 How to Verify

Check if Vulnerable:

Check if running NetBox 4.1.0 and verify if the configuration revision banner field accepts unsanitized HTML input.

Check Version:

Check NetBox version in admin interface or via application configuration.

Verify Fix Applied:

N/A as no official fix exists due to dispute about vulnerability status.

📡 Detection & Monitoring

Log Indicators:

  • Unusual modifications to configuration revision banners
  • Admin panel access from unexpected users

Network Indicators:

  • HTTP requests to /core/config-revisions/ with JavaScript payloads

SIEM Query:

Search for POST requests to '/core/config-revisions/' containing script tags or JavaScript patterns.

🔗 References

📤 Share & Export