CVE-2024-52943

5.4 MEDIUM

📋 TL;DR

This vulnerability allows authenticated remote attackers to inject malicious scripts into HTTP parameters when viewing archived content in Veritas Enterprise Vault. The reflected cross-site scripting (XSS) attack could execute arbitrary JavaScript in the context of authenticated users' sessions. Organizations running vulnerable versions of Enterprise Vault are affected.

💻 Affected Systems

Products:
  • Veritas Enterprise Vault
Versions: All versions before 15.1 UPD882911
Operating Systems: Windows Server (all supported versions)
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the Enterprise Vault web interface. The vulnerability exists in the archived content viewing functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could steal session cookies, perform actions as authenticated users, redirect to malicious sites, or compromise user accounts through credential theft.

🟠

Likely Case

Attackers would use this to steal session tokens or credentials from authenticated users, potentially gaining unauthorized access to archived content and administrative functions.

🟢

If Mitigated

With proper input validation and output encoding, the malicious scripts would be rendered harmless as plain text rather than executable code.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access and user interaction (viewing maliciously crafted archived content). The vulnerability was discovered by ZDI (ZDI-CAN-24697).

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 15.1 UPD882911 or later

Vendor Advisory: https://www.veritas.com/support/en_US/security/VTS24-013

Restart Required: Yes

Instructions:

1. Download the update from Veritas support portal. 2. Backup your Enterprise Vault configuration and databases. 3. Apply the update following Veritas documentation. 4. Restart Enterprise Vault services. 5. Verify the update was successful.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement web application firewall rules or input validation to sanitize HTTP parameters containing script tags and JavaScript events.

Content Security Policy

all

Implement strict Content Security Policy headers to prevent inline script execution and restrict script sources.

🧯 If You Can't Patch

  • Restrict access to Enterprise Vault web interface to trusted networks only using firewall rules.
  • Implement additional authentication layers and monitor for suspicious parameter values in web requests.

🔍 How to Verify

Check if Vulnerable:

Check Enterprise Vault version in Administration Console under Help > About. If version is earlier than 15.1 UPD882911, the system is vulnerable.

Check Version:

In Enterprise Vault Administration Console: Help > About

Verify Fix Applied:

Verify the version shows 15.1 UPD882911 or later in Administration Console. Test parameter injection attempts to confirm they are now properly sanitized.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests with suspicious parameter values containing script tags or JavaScript events in web server logs
  • Multiple failed parameter injection attempts from single IP addresses

Network Indicators:

  • HTTP traffic to Enterprise Vault containing script tags in URL parameters or POST data
  • Unusual outbound connections from Enterprise Vault server following user sessions

SIEM Query:

source="enterprise_vault_logs" AND ("<script>" OR "javascript:" OR "onerror=" OR "onload=") AND status=200

🔗 References

📤 Share & Export