CVE-2024-58321

5.4 MEDIUM

📋 TL;DR

A stored cross-site scripting vulnerability in Kentico Xperience allows attackers to inject malicious scripts via form validation rule configuration. This enables execution of arbitrary JavaScript in users' browsers when they interact with affected forms. Organizations using vulnerable Kentico Xperience versions are affected.

💻 Affected Systems

Products:
  • Kentico Xperience
Versions: Specific versions not detailed in provided references; check vendor advisory for exact affected versions
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects form validation rule configuration functionality; requires attacker access to configure form validation rules

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal user session cookies, perform actions as authenticated users, redirect to malicious sites, or deploy malware through browser exploitation.

🟠

Likely Case

Attackers would typically steal session cookies to hijack user accounts, perform phishing attacks, or deface website content.

🟢

If Mitigated

With proper input validation and output encoding, malicious scripts would be neutralized before reaching user browsers.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires ability to configure form validation rules; typically requires authenticated access with appropriate permissions

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Kentico hotfixes at provided URL for specific version

Vendor Advisory: https://devnet.kentico.com/download/hotfixes

Restart Required: Yes

Instructions:

1. Visit https://devnet.kentico.com/download/hotfixes 2. Download appropriate hotfix for your Kentico Xperience version 3. Apply hotfix following Kentico documentation 4. Restart application/services

🔧 Temporary Workarounds

Input Validation Enhancement

all

Implement additional input validation on form validation rule configuration to sanitize script tags and JavaScript content

Output Encoding

all

Ensure all form validation rule outputs are properly HTML-encoded before rendering in user browsers

🧯 If You Can't Patch

  • Restrict access to form validation rule configuration to trusted administrators only
  • Implement web application firewall rules to detect and block XSS payloads in form submissions

🔍 How to Verify

Check if Vulnerable:

Test form validation rule configuration by attempting to inject JavaScript payloads and checking if they execute in user browsers

Check Version:

Check Kentico administration interface or web.config for version information

Verify Fix Applied:

After applying patch, attempt same XSS payload injection and verify scripts are properly sanitized/encoded

📡 Detection & Monitoring

Log Indicators:

  • Unusual form validation rule modifications
  • Administrative account activity creating/modifying validation rules with script-like content

Network Indicators:

  • HTTP requests containing JavaScript payloads in form validation parameters

SIEM Query:

source="web_logs" AND ("form validation" OR "validation rule") AND ("script" OR "javascript" OR "onload" OR "onerror")

🔗 References

📤 Share & Export