CVE-2024-50837

5.4 MEDIUM

📋 TL;DR

A stored cross-site scripting (XSS) vulnerability exists in the KASHIPARA E-learning Management System Project 1.0 admin interface. Attackers can inject malicious scripts via firstname and username parameters, which execute when administrators view user lists. This affects all installations of version 1.0 with admin access.

💻 Affected Systems

Products:
  • KASHIPARA E-learning Management System Project
Versions: 1.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires admin access to exploit, but affects all default installations of version 1.0.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal admin session cookies, gain full system control, deface the platform, or install backdoors for persistent access.

🟠

Likely Case

Session hijacking leading to unauthorized admin access, data theft, or privilege escalation within the learning management system.

🟢

If Mitigated

Limited impact if proper input validation and output encoding are implemented, though stored XSS remains dangerous.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires admin privileges to inject payloads, but public proof-of-concept exists in GitHub repository.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None known

Restart Required: No

Instructions:

No official patch available. Implement input validation and output encoding in /admin/admin_user.php for firstname and username parameters.

🔧 Temporary Workarounds

Input Validation Filter

all

Add server-side validation to sanitize firstname and username inputs in admin_user.php

Edit /admin/admin_user.php to add: htmlspecialchars($input, ENT_QUOTES, 'UTF-8') for firstname and username parameters

Content Security Policy

all

Implement CSP headers to restrict script execution

Add header: Content-Security-Policy: default-src 'self'; script-src 'self'

🧯 If You Can't Patch

  • Restrict admin access to trusted IP addresses only
  • Implement web application firewall (WAF) rules to block XSS payloads

🔍 How to Verify

Check if Vulnerable:

Test by entering <script>alert('XSS')</script> in firstname/username fields in admin interface and check if script executes when viewing user list.

Check Version:

Check system version in admin panel or configuration files

Verify Fix Applied:

Attempt same XSS payload and verify it's properly encoded/escaped in output.

📡 Detection & Monitoring

Log Indicators:

  • Unusual script tags in firstname/username fields in admin logs
  • Multiple failed login attempts followed by admin user creation

Network Indicators:

  • HTTP requests with script payloads in POST parameters to admin_user.php

SIEM Query:

source="web_logs" AND (uri="/admin/admin_user.php" AND (param="firstname" OR param="username") AND payload="<script>"

🔗 References

📤 Share & Export