CVE-2024-9198

7.6 HIGH

📋 TL;DR

CVE-2024-9198 is a stored cross-site scripting (XSS) vulnerability in Clibo Manager v1.1.9.1 that allows attackers to upload malicious SVG images as profile pictures, which then execute arbitrary JavaScript when viewed. This affects all users of Clibo Manager v1.1.9.1 who have profile picture upload functionality enabled. Attackers can steal session cookies, perform actions as authenticated users, or redirect users to malicious sites.

💻 Affected Systems

Products:
  • Clibo Manager
Versions: v1.1.9.1
Operating Systems: All platforms running Clibo Manager
Default Config Vulnerable: ⚠️ Yes
Notes: Requires profile picture upload functionality to be enabled, which is typically enabled by default in Clibo Manager installations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete account takeover, session hijacking, administrative privilege escalation, and lateral movement within the application leading to data exfiltration or system compromise.

🟠

Likely Case

Session cookie theft leading to unauthorized access to user accounts, defacement of user profiles, and potential credential harvesting from other users viewing malicious profiles.

🟢

If Mitigated

Limited to self-contained profile defacement with no data exfiltration if proper content security policies and input validation are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to upload profile pictures. SVG files with embedded JavaScript payloads can be crafted with minimal technical skill.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v1.1.9.2 or later

Vendor Advisory: https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-clibo-manager

Restart Required: Yes

Instructions:

1. Download the latest version of Clibo Manager from the official vendor website. 2. Backup your current installation and database. 3. Replace the existing files with the patched version. 4. Restart the Clibo Manager service or web server. 5. Verify the update by checking the version in the admin panel.

🔧 Temporary Workarounds

Disable SVG uploads

all

Configure the application to reject SVG file uploads in profile picture functionality

Modify file upload validation to exclude .svg extensions in profile picture upload handlers

Implement Content Security Policy

all

Add CSP headers to prevent inline script execution from uploaded content

Add 'Content-Security-Policy: script-src 'self'' header to web server configuration

🧯 If You Can't Patch

  • Disable profile picture upload functionality entirely in application settings
  • Implement web application firewall rules to block SVG uploads and sanitize file uploads

🔍 How to Verify

Check if Vulnerable:

Check if running Clibo Manager version 1.1.9.1 and test if SVG files with JavaScript payloads can be uploaded as profile pictures

Check Version:

Check admin panel or application configuration for version number

Verify Fix Applied:

Attempt to upload an SVG file containing JavaScript as a profile picture - it should be rejected or sanitized

📡 Detection & Monitoring

Log Indicators:

  • Unusual SVG file uploads to profile picture endpoints
  • Multiple failed upload attempts with different file extensions
  • Administrative user login from unexpected locations following profile updates

Network Indicators:

  • HTTP POST requests to profile picture upload endpoints with SVG content-type
  • Outbound connections to external domains following profile views

SIEM Query:

source="web_server" AND (uri_path="/upload/profile" OR uri_path="/profile/upload") AND (file_extension="svg" OR content_type="image/svg+xml")

🔗 References

📤 Share & Export