CVE-2024-58322

5.4 MEDIUM

📋 TL;DR

A stored cross-site scripting vulnerability in Kentico Xperience allows attackers to inject malicious JavaScript into shipping options configuration. This could lead to session hijacking, credential theft, or redirection to malicious sites when users access affected pages. Organizations using vulnerable Kentico Xperience versions with shipping functionality are affected.

💻 Affected Systems

Products:
  • Kentico Xperience
Versions: Specific versions not detailed in references; check vendor advisory for exact affected versions
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires shipping options functionality to be enabled and accessible to users with configuration privileges.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, hijack user sessions, redirect users to phishing sites, or perform actions on behalf of authenticated users, potentially leading to complete system compromise.

🟠

Likely Case

Attackers inject malicious scripts that steal session cookies or user credentials when administrators or users view shipping configuration pages, leading to account takeover.

🟢

If Mitigated

With proper input validation and output encoding, malicious scripts are neutralized before execution, preventing successful exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to shipping options configuration interface, typically requiring authenticated user privileges.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Kentico hotfix downloads for specific version

Vendor Advisory: https://devnet.kentico.com/download/hotfixes

Restart Required: Yes

Instructions:

1. Download the appropriate hotfix from Kentico DevNet. 2. Backup your Kentico instance. 3. Apply the hotfix according to Kentico's installation instructions. 4. Restart the application server. 5. Verify the fix by testing shipping options functionality.

🔧 Temporary Workarounds

Input Validation and Output Encoding

all

Implement server-side validation and HTML encoding for shipping options input fields to prevent script injection.

Restrict Access to Configuration

all

Limit access to shipping options configuration to only necessary administrative users.

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block XSS payloads in shipping options parameters
  • Disable shipping options functionality if not required for business operations

🔍 How to Verify

Check if Vulnerable:

Test shipping options configuration fields by attempting to inject basic XSS payloads like <script>alert('test')</script> and checking if scripts execute.

Check Version:

Check Kentico administration interface or web.config for version information

Verify Fix Applied:

After patching, retest XSS payload injection attempts; scripts should be properly encoded and not execute.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to shipping configuration endpoints containing script tags or JavaScript code
  • Multiple failed login attempts following shipping configuration changes

Network Indicators:

  • Outbound connections to suspicious domains from the Kentico server following shipping configuration updates

SIEM Query:

source="kentico.log" AND ("shipping" AND ("<script>" OR "javascript:"))

🔗 References

📤 Share & Export