CVE-2024-8113

5.4 MEDIUM

📋 TL;DR

This stored cross-site scripting (XSS) vulnerability in pretix allows malicious event organizers to inject HTML tags into email previews on the settings page. While the default Content Security Policy prevents script execution, a successful CSP bypass could enable attackers to impersonate other organizers or staff users. Only pretix instances with untrusted event organizers are affected.

💻 Affected Systems

Products:
  • pretix
Versions: up to 2024.7.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects instances where untrusted users have organizer permissions

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

With CSP bypass, attacker impersonates administrators to steal credentials, modify events, or access sensitive data

🟠

Likely Case

Limited impact due to CSP protection; potential for HTML injection in email previews only

🟢

If Mitigated

No impact with proper CSP implementation and trusted organizers

🌐 Internet-Facing: MEDIUM - Requires authenticated organizer access and CSP bypass
🏢 Internal Only: LOW - Requires insider threat or compromised organizer account

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Requires authenticated organizer access AND CSP bypass (no known bypass exists)

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024.7.1

Vendor Advisory: https://pretix.eu/about/en/blog/20240823-release-2024-7-1/

Restart Required: Yes

Instructions:

1. Backup your pretix instance. 2. Update to pretix 2024.7.1 or later. 3. Restart the pretix service. 4. Verify the update was successful.

🔧 Temporary Workarounds

Restrict organizer permissions

all

Only grant organizer permissions to trusted users

Enforce strict CSP

all

Ensure Content Security Policy is properly configured and not weakened

🧯 If You Can't Patch

  • Implement strict access controls for organizer roles
  • Monitor for suspicious HTML content in email previews and organizer activities

🔍 How to Verify

Check if Vulnerable:

Check pretix version; if version is 2024.7.0 or earlier, system is vulnerable

Check Version:

python -c "import pretix; print(pretix.__version__)" or check admin interface

Verify Fix Applied:

Confirm pretix version is 2024.7.1 or later

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTML content in email preview generation logs
  • Multiple organizer account modifications

Network Indicators:

  • Suspicious HTML payloads in POST requests to organizer settings

SIEM Query:

source="pretix" AND (event="email_preview" OR event="organizer_settings") AND message="*<script>*"

🔗 References

📤 Share & Export