CVE-2025-34313

5.4 MEDIUM

📋 TL;DR

This stored XSS vulnerability in IPFire allows authenticated attackers to inject malicious JavaScript through user quota rules. The injected code executes when other users view the affected quota entries, potentially compromising their sessions or performing unauthorized actions. This affects all IPFire installations running versions before 2.29 Core Update 198.

💻 Affected Systems

Products:
  • IPFire
Versions: All versions prior to 2.29 (Core Update 198)
Operating Systems: IPFire Linux distribution
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the web interface with permissions to create user quota rules.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker could steal administrator session cookies, perform administrative actions as other users, redirect users to malicious sites, or install backdoors through the web interface.

🟠

Likely Case

Authenticated users with quota management privileges could perform session hijacking against other users, modify firewall rules, or exfiltrate sensitive configuration data.

🟢

If Mitigated

With proper network segmentation and limited user privileges, impact would be contained to the web interface with no access to underlying systems.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access and knowledge of the web interface. No public exploit code has been released.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: IPFire 2.29 (Core Update 198)

Vendor Advisory: https://www.ipfire.org/blog/ipfire-2-29-core-update-198-released

Restart Required: No

Instructions:

1. Log into IPFire web interface as admin. 2. Navigate to System > Updates. 3. Apply Core Update 198. 4. Verify update completes successfully.

🔧 Temporary Workarounds

Disable User Quota Management

all

Remove quota management permissions from non-administrative users to prevent exploitation.

Implement Web Application Firewall

all

Deploy a WAF with XSS protection rules to block malicious payloads.

🧯 If You Can't Patch

  • Restrict access to the web interface to trusted networks only
  • Implement strict user privilege separation and audit all quota rule changes

🔍 How to Verify

Check if Vulnerable:

Check IPFire version via web interface dashboard or SSH command: cat /etc/ipfire-release

Check Version:

cat /etc/ipfire-release

Verify Fix Applied:

Verify version shows 2.29 or Core Update 198. Test by attempting to inject basic XSS payload in QUOTA_USERS field.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /cgi-bin/urlfilter.cgi with MODE=USERQUOTA containing script tags
  • Multiple quota rule creations/modifications by single user

Network Indicators:

  • HTTP traffic to IPFire web interface containing JavaScript in POST parameters

SIEM Query:

source="ipfire.log" AND (uri="/cgi-bin/urlfilter.cgi" AND method="POST" AND params CONTAINS "<script" OR params CONTAINS "javascript:")

🔗 References

📤 Share & Export