CVE-2024-50579

4.6 MEDIUM

📋 TL;DR

This vulnerability allows attackers to inject malicious scripts into JetBrains YouTrack web pages through specially crafted links. When users click these links, the scripts execute in their browsers, potentially stealing session cookies or performing unauthorized actions. All YouTrack instances running vulnerable versions are affected.

💻 Affected Systems

Products:
  • JetBrains YouTrack
Versions: All versions before 2024.3.47707
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All YouTrack deployments with web interface enabled are vulnerable. The vulnerability exists in the link sanitization logic.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator session cookies, gain full control of the YouTrack instance, access sensitive issue data, modify projects, or pivot to internal systems.

🟠

Likely Case

Attackers steal user session cookies to impersonate users, access their private issues, or perform actions on their behalf within YouTrack.

🟢

If Mitigated

With proper web application firewalls and content security policies, the attack would be blocked or limited to non-sensitive actions.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Reflected XSS typically requires user interaction (clicking a malicious link) but is straightforward to exploit once the vulnerability is understood.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024.3.47707

Vendor Advisory: https://www.jetbrains.com/privacy-security/issues-fixed/

Restart Required: Yes

Instructions:

1. Backup your YouTrack instance. 2. Download YouTrack 2024.3.47707 or later from JetBrains. 3. Stop the YouTrack service. 4. Install the updated version. 5. Start the YouTrack service. 6. Verify the version is updated.

🔧 Temporary Workarounds

Implement Content Security Policy

all

Add a strict Content Security Policy header to block inline script execution

Add 'Content-Security-Policy: script-src 'self'' to web server configuration

Web Application Firewall Rules

all

Configure WAF to detect and block XSS payloads in URL parameters

Add WAF rules to block patterns like <script>, javascript:, and on* attributes in URLs

🧯 If You Can't Patch

  • Implement strict input validation on all URL parameters to reject suspicious characters
  • Deploy a reverse proxy with XSS filtering between users and YouTrack

🔍 How to Verify

Check if Vulnerable:

Check if YouTrack version is below 2024.3.47707 in the administration interface or via API

Check Version:

curl -s http://youtrack-instance/rest/admin/version | grep version

Verify Fix Applied:

Confirm version is 2024.3.47707 or higher and test that malicious script payloads in URLs are properly sanitized

📡 Detection & Monitoring

Log Indicators:

  • Unusual long URLs with script tags or javascript: in access logs
  • Multiple failed login attempts from same IP after suspicious URL access

Network Indicators:

  • HTTP requests with script tags or encoded payloads in query parameters
  • Unusual outbound connections from YouTrack server after suspicious URL access

SIEM Query:

source="youtrack_access.log" AND (url="*<script>*" OR url="*javascript:*" OR url="*onclick=*" OR url="*onerror=*")

🔗 References

📤 Share & Export