CVE-2024-5142

5.4 MEDIUM

📋 TL;DR

A stored cross-site scripting (XSS) vulnerability in the Social Module of M-Files Hubshare allows authenticated attackers to inject malicious scripts that execute in other users' browsers. This affects all M-Files Hubshare installations before version 5.0.6.0. Attackers must have authenticated access to the system to exploit this vulnerability.

💻 Affected Systems

Products:
  • M-Files Hubshare
Versions: All versions before 5.0.6.0
Operating Systems: Windows Server (primary deployment), Linux (possible in some configurations)
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the Social Module feature. The vulnerability exists in how user-generated content is processed and displayed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, perform actions as other users, redirect to malicious sites, or install malware on user systems.

🟠

Likely Case

Attackers with authenticated access could steal credentials, perform limited account takeover, or deface content visible to other users.

🟢

If Mitigated

With proper input validation and output encoding, scripts would be rendered harmless as text rather than executable code.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access and knowledge of the Social Module interface. The attack vector is typical stored XSS through user input fields.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.0.6.0

Vendor Advisory: https://empower.m-files.com/security-advisories/CVE-2024-5142

Restart Required: Yes

Instructions:

1. Download M-Files Hubshare version 5.0.6.0 or later from the M-Files customer portal. 2. Backup your current installation and database. 3. Run the installer to upgrade to the patched version. 4. Restart the M-Files Hubshare services. 5. Verify the upgrade completed successfully.

🔧 Temporary Workarounds

Disable Social Module

all

Temporarily disable the Social Module feature to prevent exploitation while planning upgrade.

Navigate to M-Files Hubshare Admin Console > Modules > Social Module > Disable

Implement WAF Rules

all

Configure web application firewall to block common XSS payloads in POST requests to Social Module endpoints.

Add WAF rules to filter script tags, javascript: URIs, and event handlers in user input

🧯 If You Can't Patch

  • Restrict user permissions to minimize who can post content in Social Module
  • Implement Content Security Policy (CSP) headers to restrict script execution

🔍 How to Verify

Check if Vulnerable:

Check M-Files Hubshare version in Admin Console > About. If version is below 5.0.6.0, system is vulnerable.

Check Version:

In M-Files Hubshare Admin Console, navigate to Help > About to view current version

Verify Fix Applied:

After upgrading, verify version shows 5.0.6.0 or higher in Admin Console. Test Social Module functionality to ensure it works without allowing script injection.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to Social Module endpoints with script-like content
  • Multiple failed login attempts followed by Social Module activity

Network Indicators:

  • HTTP requests containing script tags, javascript: URIs, or on* event handlers in Social Module paths

SIEM Query:

source="m-files-hubshare" AND (uri_path="/social/*" AND (request_body CONTAINS "<script>" OR request_body CONTAINS "javascript:"))

🔗 References

📤 Share & Export