CVE-2024-58128

5.5 MEDIUM

📋 TL;DR

This vulnerability allows attackers with admin privileges in MISP to inject malicious scripts via menu_custom_right_link parameters through the web interface, leading to cross-site scripting (XSS) attacks. It affects MISP instances running versions before 2.4.193. Admin users can exploit this to execute arbitrary JavaScript in the context of other users' sessions.

💻 Affected Systems

Products:
  • MISP (Malware Information Sharing Platform)
Versions: All versions before 2.4.193
Operating Systems: All platforms running MISP
Default Config Vulnerable: ⚠️ Yes
Notes: Requires admin privileges to exploit. The vulnerability exists in the web UI, not just CLI as previously thought.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with admin privileges could steal session cookies, perform actions as other users, or redirect users to malicious sites, potentially compromising the entire MISP instance and sensitive threat intelligence data.

🟠

Likely Case

Admin users could inject persistent XSS payloads that execute when other users view the affected menu links, allowing session hijacking or limited privilege escalation within the application.

🟢

If Mitigated

With proper admin account security and monitoring, impact is limited to authenticated admin users only, reducing the attack surface significantly.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires admin privileges but is straightforward through the web interface. No public exploit code has been identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.4.193

Vendor Advisory: https://github.com/MISP/MISP/releases/tag/v2.4.193

Restart Required: Yes

Instructions:

1. Backup your MISP instance and database. 2. Update to version 2.4.193 or later using git: 'git pull origin 2.4'. 3. Run the update script: 'sudo -u www-data bash /var/www/MISP/app/Console/cake Admin update'. 4. Restart your web server (Apache/Nginx). 5. Verify the update completed successfully.

🔧 Temporary Workarounds

Restrict Admin Privileges

all

Limit admin accounts to only trusted personnel and implement strong authentication controls.

Input Validation Filter

all

Implement web application firewall rules or input validation to block script injection in menu_custom_right_link parameters.

🧯 If You Can't Patch

  • Implement strict access controls for admin accounts and monitor admin activity logs
  • Deploy a WAF with XSS protection rules to filter malicious input

🔍 How to Verify

Check if Vulnerable:

Check your MISP version by navigating to Administration -> Server Settings -> Diagnostics in the web interface, or check the version file: cat /var/www/MISP/VERSION.json

Check Version:

cat /var/www/MISP/VERSION.json | grep -o '"version":"[^"]*' | cut -d'"' -f4

Verify Fix Applied:

Verify version is 2.4.193 or later using the same methods. Also check that menu_custom_right_link parameters are properly sanitized in the UI.

📡 Detection & Monitoring

Log Indicators:

  • Unusual admin activity modifying menu links
  • HTTP requests containing script tags in menu_custom_right_link parameters
  • Multiple failed login attempts on admin accounts

Network Indicators:

  • Unexpected JavaScript execution in MISP web interface
  • Suspicious outbound connections from MISP server

SIEM Query:

source="misp_logs" AND (event="admin_menu_update" OR parameters CONTAINS "script")

🔗 References

📤 Share & Export