CVE-2024-52583

8.2 HIGH

📋 TL;DR

The WesHacks website before November 17, 2024 contained malicious JavaScript injection through external links to 'Leostop', a potentially malicious site. This vulnerability allows attackers to execute arbitrary JavaScript code in users' browsers when they visit the compromised schedule.html page. All users accessing the vulnerable WesHacks website before the fix were affected.

💻 Affected Systems

Products:
  • WesHacks Hackathon Competition Website
Versions: All versions before commit 93dfb83 (November 17, 2024)
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the schedule.html page specifically. Requires bootstrap and jquery to be present.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of user sessions, credential theft, malware distribution, and persistent tracking of all website visitors through malicious JavaScript execution.

🟠

Likely Case

User tracking, data exfiltration, and potential injection of additional malicious payloads through the compromised JavaScript files.

🟢

If Mitigated

No impact if the website has been updated to remove Leostop references or if users have JavaScript disabled.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation is trivial - users simply need to visit the vulnerable page. The malicious JavaScript is automatically loaded.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Commit 93dfb83 or later

Vendor Advisory: https://github.com/DefinetlyNotAI/WesHacks/security/advisories/GHSA-462m-5c66-4pmh

Restart Required: No

Instructions:

1. Update to commit 93dfb83 or later. 2. Verify all references to 'Leostop' have been removed from schedule.html. 3. Clear any cached versions of the website.

🔧 Temporary Workarounds

Block Leostop domains

all

Prevent connections to the malicious Leostop site using network filtering

Disable JavaScript for WesHacks site

all

Configure browser to block JavaScript execution on the vulnerable domain

🧯 If You Can't Patch

  • Take the website offline until patched
  • Implement Content Security Policy (CSP) to restrict script sources

🔍 How to Verify

Check if Vulnerable:

Inspect schedule.html source code for any references to 'Leostop' or suspicious external JavaScript imports

Check Version:

git log --oneline -1

Verify Fix Applied:

Confirm schedule.html contains no references to 'Leostop' and check commit hash is 93dfb83 or later

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to Leostop domains
  • Unusual JavaScript file downloads from external sources

Network Indicators:

  • Outbound connections to unknown/Leostop domains on ports 80/443
  • Suspicious JavaScript file downloads

SIEM Query:

sourceIP="website_server" AND (destDomain CONTAINS "leostop" OR url CONTAINS "leostop")

🔗 References

📤 Share & Export