CVE-2024-58317

5.3 MEDIUM

📋 TL;DR

A cookie security configuration vulnerability in Kentico Xperience allows attackers to bypass SSL requirements when setting administration cookies via web.config. This could allow session hijacking or authentication bypass if cookies are intercepted over unencrypted connections. The vulnerability affects .NET Framework projects using Kentico Xperience.

💻 Affected Systems

Products:
  • Kentico Xperience
Versions: Specific versions not detailed in references; check vendor advisory for exact affected versions
Operating Systems: Windows (as .NET Framework application)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects .NET Framework projects using Kentico Xperience with web.config cookie configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers intercept administration session cookies over unencrypted connections, leading to full administrative access compromise and potential data breach.

🟠

Likely Case

Session hijacking of administrative users when they access the system over insecure networks, allowing unauthorized administrative actions.

🟢

If Mitigated

Limited impact if proper network segmentation and monitoring are in place, though authentication bypass risk remains.

🌐 Internet-Facing: HIGH - Internet-facing administration portals are directly vulnerable to cookie interception attacks.
🏢 Internal Only: MEDIUM - Internal networks still risk session hijacking if proper segmentation isn't maintained.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Configuration manipulation required but straightforward for attackers with network access.

Exploitation requires ability to intercept or manipulate network traffic to target system.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Kentico hotfixes for specific version

Vendor Advisory: https://devnet.kentico.com/download/hotfixes

Restart Required: Yes

Instructions:

1. Download appropriate hotfix from Kentico DevNet. 2. Apply hotfix to affected Kentico Xperience installation. 3. Restart application/services. 4. Verify web.config cookie settings enforce requireSSL.

🔧 Temporary Workarounds

Manual web.config hardening

windows

Manually configure cookie settings in web.config to enforce SSL requirements

Edit web.config to ensure <httpCookies requireSSL="true" /> is properly configured

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate administration interfaces
  • Deploy WAF rules to detect and block cookie manipulation attempts

🔍 How to Verify

Check if Vulnerable:

Inspect web.config for <httpCookies> configuration and verify requireSSL attribute is properly set and enforced.

Check Version:

Check Kentico administration interface for version information or inspect assembly versions.

Verify Fix Applied:

Test administration cookie transmission over HTTP to confirm SSL requirement is enforced.

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts with manipulated cookies
  • Administration access from unexpected IPs

Network Indicators:

  • HTTP requests attempting to set administration cookies without SSL
  • Cookie manipulation attempts in network traffic

SIEM Query:

source="web_server" AND (cookie="admin" OR cookie="authentication") AND protocol="HTTP"

🔗 References

📤 Share & Export