CVE-2025-59754

6.1 MEDIUM

📋 TL;DR

This reflected cross-site scripting (XSS) vulnerability in AndSoft's e-TMS allows attackers to inject malicious JavaScript via specially crafted URLs containing the 'l, demo, demo2, TNTLOGIN, UO and SuppConn' parameters. When victims click these malicious links, the attacker can execute arbitrary code in their browser session. Organizations using AndSoft e-TMS v25.03 are affected.

💻 Affected Systems

Products:
  • AndSoft e-TMS
Versions: v25.03
Operating Systems: Windows (ASP-based application)
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the default installation of e-TMS v25.03 via the '/clt/LOGINFRM_original.ASP' endpoint.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker steals session cookies, performs account takeover, redirects users to phishing sites, or performs actions on behalf of authenticated users.

🟠

Likely Case

Session hijacking, credential theft, or defacement of the application interface through injected content.

🟢

If Mitigated

Limited impact if input validation and output encoding are properly implemented, though some risk remains.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Reflected XSS vulnerabilities are commonly exploited with simple malicious URLs that don't require authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for updated version

Vendor Advisory: https://www.incibe.es/en/incibe-cert/notices/aviso/update-24092025-multiple-vulnerabilities-andsofts-e-tms

Restart Required: Yes

Instructions:

1. Review the vendor advisory at the provided URL. 2. Apply the recommended patch from AndSoft. 3. Restart the e-TMS application services. 4. Verify the fix by testing the vulnerable parameters.

🔧 Temporary Workarounds

Input Validation Filter

windows

Implement server-side input validation to sanitize the vulnerable parameters before processing.

Implement ASP input validation for parameters: l, demo, demo2, TNTLOGIN, UO, SuppConn

Web Application Firewall (WAF)

all

Deploy a WAF with XSS protection rules to block malicious requests containing script payloads.

Configure WAF rules to detect and block XSS patterns in URL parameters

🧯 If You Can't Patch

  • Implement Content Security Policy (CSP) headers to restrict script execution
  • Disable or restrict access to the vulnerable '/clt/LOGINFRM_original.ASP' endpoint if not required

🔍 How to Verify

Check if Vulnerable:

Test the vulnerable parameters by sending XSS payloads like <script>alert('test')</script> in the l, demo, demo2, TNTLOGIN, UO, and SuppConn parameters to '/clt/LOGINFRM_original.ASP'.

Check Version:

Check the e-TMS application interface or configuration files for version information (typically v25.03 for vulnerable systems).

Verify Fix Applied:

After patching, repeat the XSS test with the same payloads and verify no script execution occurs.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to '/clt/LOGINFRM_original.ASP' containing script tags or JavaScript in parameters
  • Unusual parameter values in login-related requests

Network Indicators:

  • URLs with encoded script payloads in query parameters
  • Requests with suspicious parameter names (l, demo, demo2, TNTLOGIN, UO, SuppConn) containing executable code

SIEM Query:

source="web_server" AND url="*LOGINFRM_original.ASP*" AND (param="*<script>*" OR param="*javascript:*" OR param="*onerror=*" OR param="*onload=*")

🔗 References

📤 Share & Export