CVE-2024-55064

5.4 MEDIUM

📋 TL;DR

Multiple cross-site scripting (XSS) vulnerabilities in EasyVirt DC NetScope allow remote attackers to inject malicious JavaScript or HTML code through various parameters. This affects users of EasyVirt DC NetScope version 8.6.4 and earlier. Attackers could execute arbitrary scripts in victims' browsers when they interact with vulnerable pages.

💻 Affected Systems

Products:
  • EasyVirt DC NetScope
Versions: <= 8.6.4
Operating Systems: All supported OS
Default Config Vulnerable: ⚠️ Yes
Notes: All installations with default configurations are vulnerable. The vulnerabilities exist in multiple endpoints with different parameters.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, perform actions as authenticated users, redirect to malicious sites, or install malware on user systems.

🟠

Likely Case

Session hijacking, credential theft, or defacement of application pages through script injection.

🟢

If Mitigated

Limited impact if input validation and output encoding are properly implemented, though some functionality disruption may occur.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to the vulnerable endpoints. The GitHub reference contains technical details about the vulnerabilities.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

1. Monitor vendor for security updates. 2. Apply patches when available. 3. Test in non-production environment first.

🔧 Temporary Workarounds

Input Validation and Output Encoding

all

Implement server-side validation and proper output encoding for all user inputs

Web Application Firewall (WAF)

all

Deploy WAF with XSS protection rules to filter malicious inputs

🧯 If You Can't Patch

  • Restrict network access to the application to trusted users only
  • Implement Content Security Policy (CSP) headers to limit script execution

🔍 How to Verify

Check if Vulnerable:

Test the vulnerable endpoints (/smtp/update, /proxy/ntp/change, /process_new_vcenter) with XSS payloads in the identified parameters

Check Version:

Check application version in admin interface or configuration files

Verify Fix Applied:

Verify that user inputs are properly sanitized and encoded in the vulnerable endpoints

📡 Detection & Monitoring

Log Indicators:

  • Unusual parameter values containing script tags or JavaScript code in HTTP requests
  • Multiple failed login attempts followed by suspicious parameter submissions

Network Indicators:

  • HTTP requests with script payloads in smtp_server, smtp_account, smtp_password, email_recipients, ntp, dns, or newVcenterAddress parameters

SIEM Query:

http.method:POST AND (http.uri:"/smtp/update" OR http.uri:"/proxy/ntp/change" OR http.uri:"/process_new_vcenter") AND (http.param:*<script* OR http.param:*javascript:* OR http.param:*onerror=*)

🔗 References

📤 Share & Export