CVE-2025-14347

6.3 MEDIUM

📋 TL;DR

This CVE describes a reflected cross-site scripting (XSS) vulnerability in Proliz Software Ltd.'s OBS Student Affairs Information System. Attackers can inject malicious scripts into web pages by tricking users into clicking specially crafted links. All users of affected OBS versions are potentially at risk.

💻 Affected Systems

Products:
  • Proliz Software Ltd. OBS (Student Affairs Information System)
Versions: All versions before 26.5009
Operating Systems: Any OS running the web application
Default Config Vulnerable: ⚠️ Yes
Notes: This is a web application vulnerability, so the underlying OS is less relevant than the application configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, perform actions as authenticated users, redirect to malicious sites, or install malware on user systems.

🟠

Likely Case

Session hijacking, credential theft, or defacement of application pages through script injection.

🟢

If Mitigated

Limited impact if input validation and output encoding are properly implemented, though some risk remains.

🌐 Internet-Facing: HIGH - Reflected XSS typically requires user interaction but can be delivered via phishing or malicious links.
🏢 Internal Only: MEDIUM - Internal users could still be targeted via internal phishing or compromised internal sites.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Reflected XSS typically has low exploitation complexity but requires user interaction (clicking a malicious link).

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 26.5009 or later

Vendor Advisory: https://www.usom.gov.tr/bildirim/tr-25-0463

Restart Required: Yes

Instructions:

1. Download version 26.5009 or later from Proliz Software. 2. Backup current installation and data. 3. Install the updated version following vendor instructions. 4. Restart the application server.

🔧 Temporary Workarounds

Web Application Firewall (WAF)

all

Deploy a WAF with XSS protection rules to filter malicious input.

Input Validation

all

Implement strict input validation on all user-supplied data before processing.

🧯 If You Can't Patch

  • Implement Content Security Policy (CSP) headers to restrict script execution sources
  • Educate users about phishing risks and not clicking untrusted links

🔍 How to Verify

Check if Vulnerable:

Check application version in admin interface or configuration files. If version is below 26.5009, system is vulnerable.

Check Version:

Check application admin panel or consult vendor documentation for version checking method.

Verify Fix Applied:

Confirm version is 26.5009 or higher and test XSS payloads to ensure they are properly sanitized.

📡 Detection & Monitoring

Log Indicators:

  • Unusual long parameter values in HTTP requests
  • Requests containing script tags or JavaScript in URL parameters

Network Indicators:

  • HTTP requests with suspicious parameters containing script elements
  • Multiple failed XSS attempts from same source

SIEM Query:

source="web_server" AND (url="*<script*" OR param="*javascript:*" OR param="*onerror=*" OR param="*onload=*")

🔗 References

📤 Share & Export