CVE-2024-50575

5.4 MEDIUM

📋 TL;DR

This vulnerability allows reflected cross-site scripting (XSS) attacks in JetBrains YouTrack's Widget API. Attackers can inject malicious scripts that execute in users' browsers when they click specially crafted links. All YouTrack instances running vulnerable versions are affected.

💻 Affected Systems

Products:
  • JetBrains YouTrack
Versions: All versions before 2024.3.47707
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the Widget API component specifically. All deployment types (on-premise, cloud) are vulnerable if running affected versions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, perform actions as authenticated users, or redirect users to malicious sites, potentially leading to account compromise or data theft.

🟠

Likely Case

Attackers could perform limited session hijacking or defacement through malicious script execution in users' browsers.

🟢

If Mitigated

With proper input validation and output encoding, the impact is minimal as malicious scripts would be neutralized before execution.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Reflected XSS typically requires user interaction (clicking a malicious link) but is straightforward to exploit once the vulnerability is understood.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024.3.47707

Vendor Advisory: https://www.jetbrains.com/privacy-security/issues-fixed/

Restart Required: Yes

Instructions:

1. Backup your YouTrack instance. 2. Download version 2024.3.47707 or later from JetBrains. 3. Follow JetBrains' upgrade documentation for your deployment type. 4. Restart the YouTrack service.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement web application firewall (WAF) rules or reverse proxy filters to sanitize Widget API inputs

Content Security Policy

all

Implement strict CSP headers to limit script execution sources

🧯 If You Can't Patch

  • Implement strict Content Security Policy (CSP) headers to prevent inline script execution
  • Configure WAF rules to block suspicious patterns in Widget API requests

🔍 How to Verify

Check if Vulnerable:

Check YouTrack version in Administration → System → About. If version is below 2024.3.47707, you are vulnerable.

Check Version:

Check web interface at Administration → System → About or review server logs for version information

Verify Fix Applied:

After upgrade, verify version is 2024.3.47707 or higher in Administration → System → About.

📡 Detection & Monitoring

Log Indicators:

  • Unusual Widget API requests with script tags or JavaScript payloads
  • Multiple failed Widget API requests with similar patterns

Network Indicators:

  • HTTP requests to Widget API endpoints containing script tags or JavaScript code
  • Referrer headers containing malicious payloads

SIEM Query:

source="youtrack" AND (uri="*/api/widget*" AND (content="<script" OR content="javascript:"))

🔗 References

📤 Share & Export