CVE-2024-51457

4.4 MEDIUM

📋 TL;DR

This CVE describes a cross-site scripting (XSS) vulnerability in IBM Robotic Process Automation for Cloud Pak that allows authenticated users to inject malicious JavaScript into the web interface. The vulnerability could lead to credential theft or session hijacking within trusted sessions. Affected versions include 21.0.0 through 21.0.7.19 and 23.0.0 through 23.0.19.

💻 Affected Systems

Products:
  • IBM Robotic Process Automation for Cloud Pak
Versions: 21.0.0 through 21.0.7.19 and 23.0.0 through 23.0.19
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to exploit. Cloud Pak deployments with internet-facing interfaces are at higher risk.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could steal administrator credentials, hijack user sessions, perform actions as authenticated users, and potentially pivot to other systems.

🟠

Likely Case

Authenticated users could steal session cookies or credentials from other users, leading to unauthorized access to the RPA platform.

🟢

If Mitigated

With proper input validation and output encoding, the risk is limited to authenticated users only, reducing the attack surface.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

XSS vulnerabilities are commonly exploited and require authenticated access. Attack complexity is low once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply fixes as per IBM Security Bulletin

Vendor Advisory: https://www.ibm.com/support/pages/node/7181230

Restart Required: Yes

Instructions:

1. Review IBM Security Bulletin. 2. Apply appropriate fix packs or interim fixes. 3. Restart affected services. 4. Verify the fix is applied.

🔧 Temporary Workarounds

Input Validation Enhancement

all

Implement additional input validation and output encoding for user-supplied data in web interfaces.

Content Security Policy

all

Implement strict Content Security Policy headers to limit script execution.

🧯 If You Can't Patch

  • Restrict access to the web interface to trusted networks only
  • Implement web application firewall rules to detect and block XSS payloads

🔍 How to Verify

Check if Vulnerable:

Check current version against affected ranges: 21.0.0-21.0.7.19 or 23.0.0-23.0.19

Check Version:

Check IBM RPA for Cloud Pak administration console or deployment manifests for version information.

Verify Fix Applied:

Verify version is updated beyond affected ranges and test XSS payloads are properly sanitized.

📡 Detection & Monitoring

Log Indicators:

  • Unusual JavaScript payloads in web requests
  • Multiple failed login attempts followed by successful authentication

Network Indicators:

  • Suspicious JavaScript in HTTP requests to RPA endpoints
  • Unexpected outbound connections after authenticated sessions

SIEM Query:

source="web_server_logs" AND (url="*<script>*" OR url="*javascript:*" OR url="*onload=*" OR url="*onerror=*")

🔗 References

📤 Share & Export