CVE-2025-60917

4.6 MEDIUM

📋 TL;DR

A reflected cross-site scripting (XSS) vulnerability in Austrian Archaeological Institute Openatlas allows attackers to inject malicious scripts via the color parameter in the /overview/network/ endpoint. This enables execution of arbitrary JavaScript in users' browsers when they visit a crafted URL. Users of Openatlas versions before 8.12.0 are affected.

💻 Affected Systems

Products:
  • Austrian Archaeological Institute Openatlas
Versions: All versions before 8.12.0
Operating Systems: All platforms running Openatlas
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default installation when the /overview/network/ endpoint is accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers steal user session cookies, perform actions as authenticated users, redirect to malicious sites, or install malware via browser exploitation.

🟠

Likely Case

Session hijacking, credential theft, or defacement of the application interface through injected content.

🟢

If Mitigated

Limited impact with proper input validation, output encoding, and Content Security Policy (CSP) headers in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires tricking users into clicking a malicious link containing the crafted payload in the color parameter.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.12.0

Vendor Advisory: https://www.sec4you-pentest.com/schwachstelle/openatlas-schwachstelle-xss-in-farb-feldern-ort/

Restart Required: Yes

Instructions:

1. Backup your Openatlas installation and database. 2. Download Openatlas version 8.12.0 or later from the official repository. 3. Replace the existing installation with the patched version. 4. Restart the web server service.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement server-side validation to reject or sanitize malicious input in the color parameter.

Modify the endpoint handler to validate color parameter against a whitelist of safe values

Web Application Firewall (WAF) Rule

all

Deploy a WAF rule to block requests containing XSS payloads in the color parameter.

Add rule: 'block requests where query string contains <script> or javascript:' in color parameter

🧯 If You Can't Patch

  • Implement strict Content Security Policy (CSP) headers to prevent script execution from untrusted sources.
  • Disable or restrict access to the /overview/network/ endpoint if not required for operations.

🔍 How to Verify

Check if Vulnerable:

Test by accessing the endpoint with a payload like: /overview/network/?color=<script>alert('XSS')</script> and check if script executes.

Check Version:

Check the Openatlas version in the application's admin interface or configuration files.

Verify Fix Applied:

After patching, repeat the test payload; script execution should be prevented and input sanitized.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to /overview/network/ with suspicious strings like <script>, javascript:, or encoded payloads in the color parameter.

Network Indicators:

  • Unusual outbound connections from user browsers after visiting the /overview/network/ endpoint.

SIEM Query:

source="web_server_logs" AND uri_path="/overview/network/" AND query_string MATCHES "color=.*[<script>|javascript:].*"

🔗 References

📤 Share & Export