CVE-2024-50803

5.4 MEDIUM

📋 TL;DR

CVE-2024-50803 is a cross-site scripting (XSS) vulnerability in Redaxo CMS's mediapool feature that allows attackers to inject malicious scripts. This affects Redaxo CMS administrators who can access the mediapool interface, potentially leading to privilege escalation. The vulnerability requires user interaction but can be exploited by tricking administrators into viewing malicious content.

💻 Affected Systems

Products:
  • Redaxo CMS
Versions: 5.17.1
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations with the mediapool feature enabled (default). Requires administrator access to the mediapool interface for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could execute arbitrary JavaScript in an administrator's browser session, potentially stealing session cookies, performing actions as the administrator, or installing backdoors.

🟠

Likely Case

Attackers could steal administrator session tokens and gain unauthorized access to the CMS backend, allowing content manipulation or further system compromise.

🟢

If Mitigated

With proper input validation and output encoding, the attack would fail to execute malicious scripts, limiting impact to benign content display issues.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Proof of concept available on GitHub. Exploitation requires social engineering to trick administrators into interacting with malicious media files.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.17.2 or later

Vendor Advisory: http://redaxo.com

Restart Required: No

Instructions:

1. Backup your Redaxo installation. 2. Download the latest version from redaxo.org. 3. Replace the core files with the patched version. 4. Clear browser cache and test functionality.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement server-side input validation for mediapool file names and metadata

Modify mediapool PHP files to sanitize user input using htmlspecialchars() or similar functions

Content Security Policy

all

Implement CSP headers to restrict script execution

Add 'Content-Security-Policy: script-src 'self'' to HTTP headers

🧯 If You Can't Patch

  • Restrict mediapool access to trusted administrators only
  • Implement web application firewall rules to block XSS payloads

🔍 How to Verify

Check if Vulnerable:

Check if running Redaxo version 5.17.1 and test mediapool for unsanitized input handling

Check Version:

Check Redaxo admin panel or examine /redaxo/src/core/version.php

Verify Fix Applied:

Verify version is 5.17.2 or later and test that script tags in media metadata are properly encoded

📡 Detection & Monitoring

Log Indicators:

  • Unusual media uploads with script-like content
  • Multiple failed authentication attempts followed by mediapool access

Network Indicators:

  • HTTP requests containing script tags in mediapool parameters
  • Unusual outbound connections from CMS server

SIEM Query:

source="web_logs" AND (uri_path="/redaxo/index.php?page=mediapool" AND (query_string CONTAINS "<script>" OR query_string CONTAINS "javascript:"))

🔗 References

📤 Share & Export