CVE-2024-51320

5.4 MEDIUM

📋 TL;DR

This CVE describes a Cross-Site Scripting (XSS) vulnerability in Zucchetti Ad Hoc Infinity 2.4 that allows authenticated attackers to achieve Remote Code Execution via specific servlet components. The vulnerability affects authenticated users of the Zucchetti Ad Hoc Infinity platform. Attackers can inject malicious scripts that execute in victims' browsers, potentially leading to full system compromise.

💻 Affected Systems

Products:
  • Zucchetti Ad Hoc Infinity
Versions: 2.4
Operating Systems: All platforms running the software
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to exploit. The vulnerability exists in the /servlet/gsdm_fsave_htmltmp and /servlet/gsdm_btlk_openfile components.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Authenticated attacker achieves remote code execution, potentially gaining full control of the server, accessing sensitive data, and pivoting to other systems.

🟠

Likely Case

Attackers steal session cookies, perform actions as authenticated users, and potentially escalate to RCE through chained attacks.

🟢

If Mitigated

With proper input validation and output encoding, the XSS would be prevented, limiting impact to minor data leakage.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access and knowledge of the vulnerable endpoints. The XSS to RCE chain increases complexity.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

1. Contact Zucchetti for patch availability. 2. Apply vendor-provided patches. 3. Test in non-production environment first. 4. Deploy to production systems.

🔧 Temporary Workarounds

Input Validation and Sanitization

all

Implement strict input validation and output encoding for the affected servlet endpoints

Web Application Firewall Rules

all

Deploy WAF rules to block malicious requests to /servlet/gsdm_fsave_htmltmp and /servlet/gsdm_btlk_openfile

🧯 If You Can't Patch

  • Implement strict access controls to limit who can access the vulnerable endpoints
  • Deploy network segmentation to isolate affected systems from critical assets

🔍 How to Verify

Check if Vulnerable:

Test the /servlet/gsdm_fsave_htmltmp and /servlet/gsdm_btlk_openfile endpoints with XSS payloads while authenticated

Check Version:

Check application version through admin interface or configuration files

Verify Fix Applied:

Retest the endpoints with XSS payloads after applying mitigations to confirm they no longer execute

📡 Detection & Monitoring

Log Indicators:

  • Unusual requests to /servlet/gsdm_fsave_htmltmp or /servlet/gsdm_btlk_openfile with script tags or encoded payloads
  • Multiple failed authentication attempts followed by successful login and servlet access

Network Indicators:

  • HTTP requests containing script injection patterns to the vulnerable endpoints
  • Unusual outbound connections from the application server following servlet access

SIEM Query:

source="web_server" AND (uri="/servlet/gsdm_fsave_htmltmp" OR uri="/servlet/gsdm_btlk_openfile") AND (payload CONTAINS "<script>" OR payload CONTAINS "javascript:")

🔗 References

📤 Share & Export