CVE-2025-59767

6.1 MEDIUM

📋 TL;DR

This reflected cross-site scripting (XSS) vulnerability in AndSoft's e-TMS allows attackers to inject malicious JavaScript via specially crafted URLs containing the 'l, demo, demo2, TNTLOGIN, UO and SuppConn' parameters. When victims click these malicious links, the attacker can execute arbitrary code in their browser session. Organizations using AndSoft e-TMS v25.03 are affected.

💻 Affected Systems

Products:
  • AndSoft e-TMS
Versions: v25.03
Operating Systems: Windows (ASP-based application)
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the default installation of e-TMS v25.03 at the '/clt/LOGINFRM_LVE.ASP' endpoint.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, perform actions as authenticated users, redirect to malicious sites, or install malware on victim systems.

🟠

Likely Case

Session hijacking, credential theft, or defacement of the application interface through injected content.

🟢

If Mitigated

Limited impact if input validation and output encoding are properly implemented, though some user interface manipulation may still occur.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Reflected XSS vulnerabilities are commonly exploited with simple malicious URLs that don't require authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.incibe.es/en/incibe-cert/notices/aviso/update-24092025-multiple-vulnerabilities-andsofts-e-tms

Restart Required: No

Instructions:

1. Monitor AndSoft for security updates. 2. Apply any available patches immediately. 3. Test in non-production environment first.

🔧 Temporary Workarounds

Web Application Firewall (WAF) Rules

all

Implement WAF rules to block malicious XSS payloads targeting the vulnerable parameters.

# WAF-specific rules vary by vendor

Input Validation Filter

windows

Add server-side validation to sanitize the vulnerable parameters before processing.

# Implementation depends on ASP application code

🧯 If You Can't Patch

  • Implement Content Security Policy (CSP) headers to restrict script execution
  • Deploy network segmentation to limit access to vulnerable systems

🔍 How to Verify

Check if Vulnerable:

Test by injecting harmless payloads like <script>alert('test')</script> into the vulnerable parameters via URL.

Check Version:

Check application version in web interface or configuration files

Verify Fix Applied:

Retest with the same payloads after applying fixes; successful fix should show encoded output, not executed scripts.

📡 Detection & Monitoring

Log Indicators:

  • Unusual parameter values containing script tags or JavaScript in access logs
  • Multiple failed login attempts with malicious payloads

Network Indicators:

  • HTTP requests with suspicious parameters containing script tags or encoded payloads

SIEM Query:

web.url:*LOGINFRM_LVE.ASP* AND (web.param:*<script* OR web.param:*javascript:* OR web.param:*onerror=*)

🔗 References

📤 Share & Export