CVE-2025-12001

6.1 MEDIUM

📋 TL;DR

This vulnerability allows attackers to inject malicious scripts into application manifests, which could lead to stored cross-site scripting (XSS) attacks when other users view the affected manifests. It affects BLU-IC2 and BLU-IC4 products up to version 1.19.5. Users of these products who view or interact with manipulated manifests are at risk.

💻 Affected Systems

Products:
  • BLU-IC2
  • BLU-IC4
Versions: through 1.19.5
Operating Systems: Not specified
Default Config Vulnerable: ⚠️ Yes
Notes: All installations up to version 1.19.5 are vulnerable unless custom security controls have been implemented.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could execute arbitrary JavaScript in victims' browsers, potentially stealing session cookies, performing actions on behalf of users, or redirecting to malicious sites.

🟠

Likely Case

Attackers with access to modify manifests could inject scripts that steal user data or perform limited malicious actions within the application context.

🟢

If Mitigated

With proper input validation and output encoding, malicious scripts would be rendered harmless as text rather than executable code.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires ability to modify application manifests and for victims to view the manipulated manifests.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 1.19.5

Vendor Advisory: https://azure-access.com/security-advisories

Restart Required: No

Instructions:

1. Check current version using product's version command. 2. If version is 1.19.5 or earlier, upgrade to the latest version. 3. Verify the fix by checking that manifest inputs are properly sanitized.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement server-side input validation to sanitize manifest content before storage

Implement input validation for all manifest fields to strip or encode script tags and JavaScript

Output Encoding

all

Apply proper output encoding when displaying manifest content to users

Use HTML entity encoding for all user-controlled content displayed in web interfaces

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block XSS payloads in manifest data
  • Restrict access to manifest modification functionality to trusted users only

🔍 How to Verify

Check if Vulnerable:

Check if your BLU-IC2/BLU-IC4 version is 1.19.5 or earlier using the product's version command

Check Version:

Use product-specific command to check version (consult product documentation)

Verify Fix Applied:

After patching, test manifest fields with XSS payloads to ensure they are properly sanitized and not executed

📡 Detection & Monitoring

Log Indicators:

  • Unusual manifest modifications
  • Multiple failed manifest validation attempts
  • Suspicious characters in manifest content logs

Network Indicators:

  • Unexpected script tags in manifest-related API calls
  • Suspicious JavaScript in HTTP POST/PUT requests to manifest endpoints

SIEM Query:

search 'manifest' AND ('script' OR 'javascript' OR 'onload' OR 'onerror') in web request logs

🔗 References

📤 Share & Export