CVE-2024-49706

6.1 MEDIUM

📋 TL;DR

This CVE describes an open redirect vulnerability in Internet Starter, a module of the SoftCOM iKSORIS system. Attackers can manipulate the 'target' parameter in POST requests to redirect users to malicious websites. Organizations using vulnerable versions of iKSORIS are affected.

💻 Affected Systems

Products:
  • SoftCOM iKSORIS system with Internet Starter module
Versions: Versions before 79.0
Operating Systems: Not specified, likely Windows-based given vendor
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Internet Starter module to be enabled and accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Users could be redirected to phishing sites that steal credentials or deliver malware, potentially leading to account compromise or system infection.

🟠

Likely Case

Attackers use crafted links to redirect users to malicious sites for phishing or credential harvesting campaigns.

🟢

If Mitigated

With proper web filtering and user awareness, impact is limited to failed phishing attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending a POST request with a malicious base64-encoded URL parameter.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 79.0

Vendor Advisory: https://www.iksoris.pl/system-rezerwacji-i-sprzedazy-biletow-iksoris.html

Restart Required: Yes

Instructions:

1. Download version 79.0 or later from the vendor. 2. Backup current installation. 3. Apply the update following vendor instructions. 4. Restart the iKSORIS service.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement server-side validation to reject base64-encoded URLs in the target parameter.

Web Application Firewall Rule

all

Block requests containing base64-encoded URLs in POST parameters.

🧯 If You Can't Patch

  • Implement strict URL validation at the network perimeter or WAF to block malicious redirects.
  • Educate users to verify URLs before entering credentials and enable browser phishing protection.

🔍 How to Verify

Check if Vulnerable:

Test by sending a POST request with a base64-encoded external URL in the target parameter to vulnerable endpoints.

Check Version:

Check the iKSORIS administration panel or software properties for version number.

Verify Fix Applied:

After patching, attempt the same test; successful redirects should be blocked or sanitized.

📡 Detection & Monitoring

Log Indicators:

  • POST requests with base64-encoded strings in parameters
  • Unusual redirect patterns in web server logs

Network Indicators:

  • HTTP 302 redirects to external domains from iKSORIS endpoints

SIEM Query:

source="iKSORIS" AND (method="POST" AND url_decoded CONTAINS "target=" AND base64_string_detected)

🔗 References

📤 Share & Export