CVE-2025-0668
📋 TL;DR
This CVE describes a stored cross-site scripting (XSS) vulnerability in BOINC Server that allows attackers to inject malicious scripts into web pages. The vulnerability affects BOINC Server versions before 1.4.5 and could enable attackers to steal session cookies, perform actions as authenticated users, or deface websites. Anyone running vulnerable BOINC Server instances is affected.
💻 Affected Systems
- BOINC Server
📦 What is this software?
Boinc Server by Universityofcalifornia
⚠️ Risk & Real-World Impact
Worst Case
Attackers could steal administrator credentials, take full control of the BOINC server, compromise user accounts, and potentially pivot to other systems in the network.
Likely Case
Attackers inject malicious JavaScript to steal session cookies, perform actions as authenticated users, or deface the BOINC web interface.
If Mitigated
With proper input validation and output encoding, the malicious scripts would be rendered harmless as text rather than executable code.
🎯 Exploit Status
While the CWE is listed as CWE-89 (SQL Injection), the description indicates XSS. The provided references discuss SQL injection vulnerabilities in BOINC, suggesting this advisory may contain multiple vulnerability types.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.4.5
Vendor Advisory: https://boinc.berkeley.edu/
Restart Required: Yes
Instructions:
1. Backup your BOINC Server configuration and data. 2. Download BOINC Server version 1.4.5 or later from the official website. 3. Stop the BOINC Server service. 4. Install the updated version. 5. Restart the BOINC Server service. 6. Verify the installation by checking the version.
🔧 Temporary Workarounds
Implement Web Application Firewall (WAF)
allDeploy a WAF with XSS protection rules to filter malicious input before it reaches the BOINC Server.
Input Validation Filter
allImplement additional input validation at the web server or reverse proxy level to sanitize user input.
🧯 If You Can't Patch
- Isolate the BOINC Server behind a reverse proxy with strict input validation and XSS filtering
- Implement Content Security Policy (CSP) headers to restrict script execution sources
🔍 How to Verify
Check if Vulnerable:
Check the BOINC Server version by accessing the web interface or checking the server logs for version information.
Check Version:
On Linux: 'boinc --version' or check the web interface. On Windows: Check the installed program version in Control Panel or run 'boinc.exe --version' from command line.
Verify Fix Applied:
After patching, verify the version is 1.4.5 or later and test input fields for proper sanitization by attempting to inject basic XSS payloads in a controlled manner.
📡 Detection & Monitoring
Log Indicators:
- Unusual JavaScript or HTML patterns in user input fields
- Multiple failed login attempts followed by successful login from same IP
- Unexpected changes to web page content
Network Indicators:
- HTTP requests containing suspicious script tags or JavaScript code in parameters
- Unusual outbound connections from the BOINC server
SIEM Query:
source="boinc_server" AND (http_request="*<script*" OR http_request="*javascript:*" OR http_request="*onerror=*" OR http_request="*onload=*")