CVE-2025-15219
📋 TL;DR
This is a cross-site scripting (XSS) vulnerability in SohuTV CacheCloud that allows attackers to inject malicious scripts into web pages via the doMachineList/doPodList functions. The vulnerability affects CacheCloud versions up to 3.2.0 and can be exploited remotely by authenticated users.
💻 Affected Systems
- SohuTV CacheCloud
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers could steal session cookies, perform actions as authenticated users, redirect users to malicious sites, or deface the application interface.
Likely Case
Session hijacking leading to unauthorized access to cache management functions, potentially allowing data manipulation or service disruption.
If Mitigated
With proper input validation and output encoding, the impact is limited to minor interface manipulation with no data compromise.
🎯 Exploit Status
Exploit details are publicly disclosed in GitHub issues. Attack requires authenticated access to the web interface.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Not available
Vendor Advisory: Not available
Restart Required: No
Instructions:
No official patch available. Monitor the GitHub repository for updates. Consider implementing input validation and output encoding as a temporary fix.
🔧 Temporary Workarounds
Implement Input Validation
allAdd server-side validation to sanitize user input in the affected functions
Modify src/main/java/com/sohu/cache/web/controller/MachineManageController.java to validate and sanitize input parameters
Enable Content Security Policy
allImplement CSP headers to restrict script execution
Add Content-Security-Policy header to web server configuration
🧯 If You Can't Patch
- Restrict network access to CacheCloud management interface to trusted IPs only
- Implement a web application firewall (WAF) with XSS protection rules
🔍 How to Verify
Check if Vulnerable:
Check if CacheCloud version is 3.2.0 or earlier. Review the MachineManageController.java file for lack of input sanitization in doMachineList/doPodList functions.
Check Version:
Check application version in web interface or configuration files
Verify Fix Applied:
Test the affected endpoints with XSS payloads to ensure they are properly sanitized or blocked.
📡 Detection & Monitoring
Log Indicators:
- Unusual parameter values in /machine/doMachineList or /machine/doPodList requests
- JavaScript or HTML tags in request parameters
Network Indicators:
- HTTP requests containing script tags or JavaScript in parameters to vulnerable endpoints
SIEM Query:
web_requests WHERE (url CONTAINS '/machine/doMachineList' OR url CONTAINS '/machine/doPodList') AND (parameters CONTAINS '<script' OR parameters CONTAINS 'javascript:')