CVE-2024-58323

5.4 MEDIUM

📋 TL;DR

A stored cross-site scripting vulnerability in Kentico Xperience allows attackers to inject malicious scripts via the Checkbox form component. This enables script execution in users' browsers when they interact with affected forms, potentially compromising user sessions and data. Organizations using Kentico Xperience with vulnerable versions are affected.

💻 Affected Systems

Products:
  • Kentico Xperience
Versions: Specific versions not detailed in provided references; check vendor advisory for exact affected versions
Operating Systems: All platforms running Kentico Xperience
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the Checkbox form component when HTML support is enabled in the form builder.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal user session cookies, redirect users to malicious sites, perform actions on behalf of authenticated users, or deface websites by injecting persistent malicious content.

🟠

Likely Case

Attackers would typically steal session cookies or user credentials, potentially leading to account takeover and unauthorized access to sensitive data.

🟢

If Mitigated

With proper input validation and output encoding, the impact is limited to potential UI disruption without data compromise.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires ability to create or modify forms using the vulnerable component, typically requiring some level of access to the form builder interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Kentico hotfixes at provided URL

Vendor Advisory: https://devnet.kentico.com/download/hotfixes

Restart Required: Yes

Instructions:

1. Download the appropriate hotfix from Kentico DevNet. 2. Apply the hotfix according to Kentico's patching procedures. 3. Restart the application/services. 4. Verify the fix by testing form functionality.

🔧 Temporary Workarounds

Disable HTML in Checkbox Components

all

Temporarily disable HTML support in Checkbox form components to prevent script injection.

Implement Input Validation

all

Add server-side validation to sanitize or reject HTML content in form submissions.

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block XSS payloads in form submissions
  • Restrict access to form builder functionality to trusted administrators only

🔍 How to Verify

Check if Vulnerable:

Test if HTML content in Checkbox form components renders as HTML rather than plain text. Attempt to inject simple script tags and check if they execute.

Check Version:

Check Kentico administration interface or application files for version information

Verify Fix Applied:

After patching, attempt the same XSS injection tests to confirm scripts no longer execute and are properly sanitized.

📡 Detection & Monitoring

Log Indicators:

  • Unusual form submissions containing script tags or JavaScript code
  • Multiple failed validation attempts on form inputs

Network Indicators:

  • HTTP requests with suspicious payloads in form data parameters

SIEM Query:

Search for POST requests to form submission endpoints containing patterns like '<script>', 'javascript:', or common XSS payloads

🔗 References

📤 Share & Export