CVE-2024-51181

6.1 MEDIUM

📋 TL;DR

A reflected cross-site scripting (XSS) vulnerability exists in the IFSC Code Finder Project v1.0 admin interface, allowing attackers to inject malicious scripts via the 'searchifsccode' parameter. This affects administrators who access the vulnerable profile.php page, potentially leading to session hijacking or unauthorized actions.

💻 Affected Systems

Products:
  • PHPGurukul IFSC Code Finder Project
Versions: v1.0
Operating Systems: Any OS running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the admin interface at /ifscfinder/admin/profile.php. Requires admin access to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal admin session cookies, perform unauthorized administrative actions, deface the site, or redirect users to malicious sites, potentially compromising the entire application.

🟠

Likely Case

Session hijacking leading to unauthorized access to admin functions, data manipulation, or installation of backdoors.

🟢

If Mitigated

Limited impact if input validation and output encoding are properly implemented, though some risk remains if other vulnerabilities exist.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires admin credentials to access the vulnerable page. The vulnerability is in a publicly documented PDF with proof-of-concept details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch available. Implement input validation and output encoding in profile.php for the 'searchifsccode' parameter.

🔧 Temporary Workarounds

Input Validation and Output Encoding

all

Sanitize the 'searchifsccode' parameter by validating input and encoding output to prevent script execution.

Modify /ifscfinder/admin/profile.php to use htmlspecialchars() or similar functions on user input.

Web Application Firewall (WAF) Rules

all

Deploy WAF rules to block XSS payloads in the 'searchifsccode' parameter.

Configure WAF to filter malicious scripts in request parameters.

🧯 If You Can't Patch

  • Restrict access to /ifscfinder/admin/profile.php to trusted IP addresses only.
  • Implement Content Security Policy (CSP) headers to mitigate XSS impact.

🔍 How to Verify

Check if Vulnerable:

Test by injecting a simple XSS payload like <script>alert('XSS')</script> into the 'searchifsccode' parameter on the admin profile page.

Check Version:

Check the project version in documentation or configuration files; no standard command available.

Verify Fix Applied:

Verify that injected scripts are properly encoded and do not execute in the browser.

📡 Detection & Monitoring

Log Indicators:

  • Unusual requests to profile.php with script tags or JavaScript in parameters
  • Multiple failed login attempts followed by access to admin pages

Network Indicators:

  • HTTP requests containing script tags or encoded JavaScript in the 'searchifsccode' parameter

SIEM Query:

source="web_logs" AND uri="/ifscfinder/admin/profile.php" AND (param="searchifsccode" AND value MATCHES "<script.*>|javascript:")

🔗 References

📤 Share & Export