CVE-2024-56174

8.1 HIGH

📋 TL;DR

This vulnerability allows attackers to inject malicious scripts into Optimizely Configured Commerce search history, which then execute in users' browsers when they view their search history. It affects all users of Optimizely Configured Commerce versions before 5.2.2408 who have search functionality enabled.

💻 Affected Systems

Products:
  • Optimizely Configured Commerce
Versions: All versions before 5.2.2408
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires search functionality to be enabled and users to have search history features active.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, redirect users to malicious sites, perform actions on behalf of authenticated users, or install malware via drive-by downloads.

🟠

Likely Case

Session hijacking, credential theft, and unauthorized actions performed in the context of authenticated users.

🟢

If Mitigated

Limited to data exfiltration from the current user's session if proper input validation and output encoding are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires attacker to have ability to inject payloads into search history, typically through crafted search queries.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.2.2408

Vendor Advisory: https://support.optimizely.com/hc/en-us/articles/32344323720973-Configured-Commerce-Security-Advisory-COM-2024-01

Restart Required: Yes

Instructions:

1. Download Optimizely Configured Commerce version 5.2.2408 or later from official sources. 2. Backup current installation and database. 3. Apply the update following Optimizely's upgrade documentation. 4. Restart all application services. 5. Verify the update was successful.

🔧 Temporary Workarounds

Disable Search History

all

Temporarily disable search history functionality to prevent payload storage and execution.

Modify application configuration to disable search history features

Implement Input Validation

all

Add server-side validation to sanitize search query inputs before storage.

Implement input validation filters for all search parameters

🧯 If You Can't Patch

  • Implement WAF rules to block XSS payloads in search parameters
  • Enable Content Security Policy (CSP) headers to restrict script execution

🔍 How to Verify

Check if Vulnerable:

Check if your Optimizely Configured Commerce version is below 5.2.2408 and search history functionality is enabled.

Check Version:

Check application version in admin panel or via version files in installation directory

Verify Fix Applied:

Verify the application version is 5.2.2408 or higher and test search functionality with XSS payloads to ensure they are properly sanitized.

📡 Detection & Monitoring

Log Indicators:

  • Unusual search queries containing script tags or JavaScript code
  • Multiple failed search attempts with suspicious patterns

Network Indicators:

  • Unexpected outbound connections from user browsers after search actions
  • Suspicious referrer headers in requests

SIEM Query:

search 'script' OR 'javascript:' OR 'onload=' in search query logs

🔗 References

📤 Share & Export