CVE-2024-5737

6.1 MEDIUM

📋 TL;DR

This vulnerability in the AdmirorFrames Joomla! extension allows cross-site scripting (XSS) attacks. An attacker can embed malicious HTML in image data that gets rendered as HTML by vulnerable webpages. This affects Joomla! sites using AdmirorFrames extension versions before 5.0.

💻 Affected Systems

Products:
  • AdmirorFrames Joomla! extension
Versions: All versions before 5.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Joomla! installations with AdmirorFrames extension installed and enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, perform account takeover, deface websites, or redirect users to malicious sites, potentially leading to complete site compromise.

🟠

Likely Case

Attackers inject malicious scripts to steal user session data or credentials, potentially compromising user accounts on the affected Joomla! site.

🟢

If Mitigated

With proper content security policies and input validation, impact is limited to potential data leakage from the specific vulnerable endpoint.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires the attacker to upload or inject malicious image data that gets processed by the vulnerable afGdStream.php script.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.0 and later

Vendor Advisory: https://github.com/vasiljevski/admirorframes/issues/3

Restart Required: No

Instructions:

1. Update AdmirorFrames extension to version 5.0 or later. 2. Log into Joomla! admin panel. 3. Navigate to Extensions > Manage > Update. 4. Check for AdmirorFrames updates. 5. Apply update if available. 6. Alternatively, download latest version from extension repository and install manually.

🔧 Temporary Workarounds

Disable AdmirorFrames extension

all

Temporarily disable the vulnerable extension until patching is possible

Navigate to Joomla! admin > Extensions > Manage > Manage > Disable AdmirorFrames

Restrict access to afGdStream.php

linux

Block direct access to the vulnerable script via web server configuration

# Apache: <LocationMatch "afGdStream\.php">
    Order deny,allow
    Deny from all
</LocationMatch>
# Nginx: location ~* afGdStream\.php { deny all; }

🧯 If You Can't Patch

  • Implement strict Content Security Policy (CSP) headers to prevent script execution from untrusted sources
  • Deploy web application firewall (WAF) rules to detect and block XSS payloads targeting the vulnerable endpoint

🔍 How to Verify

Check if Vulnerable:

Check Joomla! admin panel > Extensions > Manage > Manage, look for AdmirorFrames version. If version is below 5.0, system is vulnerable.

Check Version:

Check Joomla! admin panel or examine component XML file at /components/com_admirorframes/admirorframes.xml

Verify Fix Applied:

After updating, verify AdmirorFrames version shows 5.0 or higher in Joomla! extensions manager.

📡 Detection & Monitoring

Log Indicators:

  • Unusual requests to afGdStream.php with HTML/script content in parameters
  • Multiple failed attempts to access the vulnerable endpoint

Network Indicators:

  • HTTP requests containing script tags or JavaScript in image data parameters to afGdStream.php

SIEM Query:

source="web_server_logs" AND uri="*afGdStream.php*" AND (param="*<script>*" OR param="*javascript:*")

🔗 References

📤 Share & Export