CVE-2024-57278

5.4 MEDIUM

📋 TL;DR

A reflected Cross-Site Scripting vulnerability in QingScan's web interface allows attackers to inject malicious JavaScript via crafted URLs. When victims click malicious links, attackers can steal session cookies, redirect users, or perform actions on their behalf. This affects all users of QingScan v1.8.0 and earlier versions.

💻 Affected Systems

Products:
  • QingScan
Versions: <= v1.8.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the default web interface at /webscan/sqlmap/index.html

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers steal administrator session cookies, gain full control of QingScan, pivot to internal networks, and compromise sensitive security scan data.

🟠

Likely Case

Attackers steal user session cookies, hijack authenticated sessions, and perform unauthorized actions within QingScan's interface.

🟢

If Mitigated

With proper input validation and output encoding, malicious scripts are neutralized before reaching victim browsers.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires victim interaction with crafted URL; no authentication needed

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v1.8.1 or later

Vendor Advisory: https://github.com/78778443/QingScan/issues/41

Restart Required: Yes

Instructions:

1. Backup current configuration. 2. Download latest version from official repository. 3. Replace vulnerable files. 4. Restart QingScan service.

🔧 Temporary Workarounds

Web Application Firewall (WAF)

all

Deploy WAF rules to block XSS payloads in query parameters

Input Validation Filter

linux

Add input sanitization for query parameter before processing

sed -i "s/\$_GET\[\'query\'\]/htmlspecialchars(\$_GET\[\'query\'\], ENT_QUOTES)/g" /path/to/QingScan/webscan/sqlmap/index.html

🧯 If You Can't Patch

  • Restrict access to QingScan web interface to trusted IP addresses only
  • Implement Content Security Policy (CSP) headers to block inline script execution

🔍 How to Verify

Check if Vulnerable:

Access http://[qingscan-ip]/webscan/sqlmap/index.html?query=<script>alert('xss')</script> and check if script executes

Check Version:

grep 'version' /path/to/QingScan/README.md || cat /path/to/QingScan/VERSION

Verify Fix Applied:

Test same payload after patching; script should not execute and input should be properly encoded

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing <script> tags in query parameters
  • Unusual length or encoding in query parameter values

Network Indicators:

  • HTTP GET requests to /webscan/sqlmap/index.html with JavaScript payloads in query string

SIEM Query:

source="web_access.log" AND uri_path="/webscan/sqlmap/index.html" AND query="*<script>*"

🔗 References

📤 Share & Export