CVE-2024-8605

4.3 MEDIUM

📋 TL;DR

This is a cross-site scripting (XSS) vulnerability in code-projects Inventory Management 1.0 that allows attackers to inject malicious scripts into the registration form. The vulnerability affects all users who access the vulnerable registration page, potentially allowing session hijacking, credential theft, or defacement. Attackers can exploit this remotely without authentication.

💻 Affected Systems

Products:
  • code-projects Inventory Management
Versions: 1.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default installation and requires no special configuration to be exploitable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, hijack user sessions, install malware on client browsers, or completely compromise the inventory management system.

🟠

Likely Case

Attackers inject malicious scripts to steal user session cookies or credentials, potentially gaining unauthorized access to the inventory system.

🟢

If Mitigated

With proper input validation and output encoding, the vulnerability would be neutralized, preventing script execution while maintaining registration functionality.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The exploit uses basic XSS payloads and requires no authentication. Public disclosure increases likelihood of weaponization.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://code-projects.org/

Restart Required: No

Instructions:

No official patch available. Consider implementing input validation and output encoding in /view/registration.php or migrating to alternative software.

🔧 Temporary Workarounds

Input Validation Filter

all

Add server-side input validation to sanitize registration form inputs

Edit /view/registration.php to filter script tags and special characters

Content Security Policy

all

Implement CSP headers to restrict script execution

Add 'Content-Security-Policy: default-src 'self'' to HTTP headers

🧯 If You Can't Patch

  • Disable the registration functionality entirely if not needed
  • Implement a web application firewall (WAF) with XSS protection rules

🔍 How to Verify

Check if Vulnerable:

Test by submitting <script>alert('XSS')</script> to the registration form and check if script executes

Check Version:

Check software version in admin panel or readme files

Verify Fix Applied:

After implementing fixes, test with same payload to confirm script does not execute

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /view/registration.php containing script tags or JavaScript code
  • Multiple failed registration attempts with suspicious payloads

Network Indicators:

  • HTTP requests with script tags in registration form parameters
  • Unexpected JavaScript execution in registration page responses

SIEM Query:

source="web_logs" AND uri="/view/registration.php" AND (request_body CONTAINS "<script>" OR request_body CONTAINS "javascript:")

🔗 References

📤 Share & Export