CVE-2024-50841

5.4 MEDIUM

📋 TL;DR

A stored cross-site scripting vulnerability in KASHIPARA E-learning Management System Project allows attackers to inject malicious scripts into calendar event parameters. These scripts execute when administrators view the calendar page, potentially compromising admin sessions. This affects all installations of version 1.0.

💻 Affected Systems

Products:
  • KASHIPARA E-learning Management System Project
Versions: 1.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default installation; requires admin access to /admin/calendar_of_events.php

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Administrator account takeover leading to full system compromise, data theft, or deployment of additional malware.

🟠

Likely Case

Session hijacking of admin accounts, unauthorized access to sensitive student/teacher data, or defacement of the learning platform.

🟢

If Mitigated

Limited impact with proper input validation and output encoding, potentially only affecting individual admin sessions.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to create/modify calendar events; public proof-of-concept demonstrates injection via date_start, date_end, and title parameters

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch available. Implement input validation and output encoding as workaround.

🔧 Temporary Workarounds

Input Validation and Sanitization

all

Implement server-side validation and sanitization for date_start, date_end, and title parameters in calendar_of_events.php

Edit /admin/calendar_of_events.php to add: htmlspecialchars($input, ENT_QUOTES, 'UTF-8') for all user inputs

Content Security Policy

all

Implement strict CSP headers to prevent script execution from untrusted sources

Add to .htaccess or server config: Header set Content-Security-Policy "default-src 'self'; script-src 'self'"
Restart web server

🧯 If You Can't Patch

  • Restrict admin access to trusted IP addresses only
  • Implement web application firewall rules to block XSS payloads in calendar parameters

🔍 How to Verify

Check if Vulnerable:

Test by creating a calendar event with payload: <script>alert('XSS')</script> in date_start, date_end, or title fields and check if script executes when viewing calendar

Check Version:

Check project documentation or source code for version information

Verify Fix Applied:

After implementing fixes, repeat the test payload; script should not execute and should appear as plain text

📡 Detection & Monitoring

Log Indicators:

  • Unusual length or special characters in calendar event parameters
  • Multiple failed login attempts followed by calendar event creation

Network Indicators:

  • HTTP POST requests to /admin/calendar_of_events.php with script tags in parameters

SIEM Query:

source="web_logs" AND (uri="/admin/calendar_of_events.php") AND (param="date_start" OR param="date_end" OR param="title") AND (content="<script>" OR content="javascript:")

🔗 References

📤 Share & Export