CVE-2025-59764

6.1 MEDIUM

📋 TL;DR

This reflected cross-site scripting (XSS) vulnerability in AndSoft's e-TMS allows attackers to inject malicious JavaScript via specially crafted URLs containing malicious parameters. When victims click these links, the attacker can steal session cookies, redirect users, or perform actions on their behalf. Organizations using AndSoft e-TMS v25.03 with the vulnerable '/clt/LOGINFRM_FCC.ASP' page are affected.

💻 Affected Systems

Products:
  • AndSoft e-TMS
Versions: v25.03
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the default installation when the '/clt/LOGINFRM_FCC.ASP' page is accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers steal administrator session cookies, gain full system access, compromise sensitive data, and potentially pivot to internal networks.

🟠

Likely Case

Attackers steal user session cookies to impersonate legitimate users, access their data, and perform unauthorized actions within the application.

🟢

If Mitigated

With proper input validation and output encoding, malicious scripts are neutralized, preventing successful exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Reflected XSS vulnerabilities are commonly weaponized in phishing campaigns and require minimal technical skill to exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to latest version as advised by vendor

Vendor Advisory: https://www.incibe.es/en/incibe-cert/notices/aviso/update-24092025-multiple-vulnerabilities-andsofts-e-tms

Restart Required: Yes

Instructions:

1. Contact AndSoft for the latest patched version. 2. Backup current installation. 3. Apply vendor-provided patch. 4. Restart the application server. 5. Verify the fix.

🔧 Temporary Workarounds

Input Validation Filter

windows

Implement server-side input validation to sanitize 'l, demo, demo2, TNTLOGIN, UO and SuppConn' parameters

Implement ASP input validation: <% Function CleanInput(str) str = Replace(str, "<", "") str = Replace(str, ">", "") str = Replace(str, "'", "") str = Replace(str, "\"", "") CleanInput = str End Function %>

Web Application Firewall (WAF)

all

Deploy WAF rules to block XSS payloads in URL parameters

Configure WAF rule: Block requests containing <script>, javascript:, onload=, etc. in query parameters

🧯 If You Can't Patch

  • Implement Content Security Policy (CSP) headers to restrict script execution
  • Disable or restrict access to '/clt/LOGINFRM_FCC.ASP' if not required

🔍 How to Verify

Check if Vulnerable:

Test by accessing: http://[target]/clt/LOGINFRM_FCC.ASP?l=<script>alert('XSS')</script> and checking if script executes

Check Version:

Check application interface or configuration files for version information

Verify Fix Applied:

Retest with same payload - script should not execute and input should be properly encoded

📡 Detection & Monitoring

Log Indicators:

  • Unusual long parameter values in access logs
  • Requests containing script tags or JavaScript in URL parameters
  • Multiple failed login attempts from same IP

Network Indicators:

  • HTTP requests with suspicious parameters like <script>, javascript:, or encoded payloads
  • Unusual redirects from login page

SIEM Query:

source="web_logs" AND (url="*LOGINFRM_FCC.ASP*" AND (param="*<script>*" OR param="*javascript:*" OR param="*onload=*"))

🔗 References

📤 Share & Export