CVE-2024-50807

6.1 MEDIUM

📋 TL;DR

Trippo Responsive Filemanager 9.14.0 contains a cross-site scripting vulnerability that allows attackers to inject malicious scripts via SVG and PDF file uploads. This affects any website using this vulnerable version of the file manager. Attackers can execute arbitrary JavaScript in victims' browsers when they view uploaded malicious files.

💻 Affected Systems

Products:
  • Trippo Responsive Filemanager
Versions: 9.14.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the file upload functionality when SVG or PDF files containing malicious scripts are processed.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, perform actions as authenticated users, redirect users to malicious sites, or install malware via drive-by downloads.

🟠

Likely Case

Session hijacking, credential theft, or defacement of the file manager interface through stored XSS payloads.

🟢

If Mitigated

Limited impact with proper content security policies, file type validation, and user input sanitization in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires file upload capability but is straightforward once access is obtained. Public proof-of-concept demonstrates the vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

No official patch available. Consider upgrading to a newer version if available or implementing workarounds.

🔧 Temporary Workarounds

File Upload Validation

all

Implement server-side validation to sanitize SVG and PDF file content before processing or storage.

Content Security Policy

all

Implement strict Content-Security-Policy headers to prevent execution of inline scripts.

Content-Security-Policy: default-src 'self'; script-src 'self'

🧯 If You Can't Patch

  • Disable SVG and PDF file upload functionality entirely in the file manager configuration.
  • Implement web application firewall rules to block malicious file uploads containing script tags or JavaScript.

🔍 How to Verify

Check if Vulnerable:

Check if Trippo Responsive Filemanager version 9.14.0 is installed and if SVG/PDF uploads are enabled without proper sanitization.

Check Version:

Check the filemanager version in the source code or configuration files.

Verify Fix Applied:

Test file upload functionality with SVG/PDF files containing script payloads to ensure they are properly sanitized or blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads with SVG/PDF extensions containing script-like content
  • Multiple failed upload attempts with suspicious filenames

Network Indicators:

  • HTTP POST requests to file upload endpoints with SVG/PDF files
  • Subsequent requests loading uploaded files with script tags

SIEM Query:

source="web_server" AND (uri_path="/filemanager/upload" OR uri_path="/filemanager/*") AND (file_extension="svg" OR file_extension="pdf")

🔗 References

📤 Share & Export