CVE-2024-13075

Source: cna@vuldb.com

MEDIUM
5.3
Published: December 31, 2024 at 06:15 PM
Modified: January 6, 2025 at 02:57 PM

Vulnerability Description

A vulnerability classified as problematic was found in PHPGurukul Land Record System 1.0. This vulnerability affects unknown code of the file /admin/add-propertytype.php. The manipulation of the argument Land Property Type leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

CVSS Metrics

Base Score
5.3
Severity
MEDIUM
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Weaknesses (CWE)

Source: cna@vuldb.com
Source: nvd@nist.gov

AI Security Analysis

01 // Technical Summary

PHPGurukul Land Record System 1.0 suffers from a critical cross-site scripting (XSS) vulnerability, allowing attackers to inject malicious code into the application via the Land Property Type input field. This vulnerability can lead to account compromise, data theft, and website defacement, impacting users and the integrity of the system.

02 // Vulnerability Mechanism

Step 1: Payload Delivery: An attacker crafts a malicious payload containing HTML and JavaScript code (e.g., <script>alert('XSS')</script>). Step 2: Payload Injection: The attacker submits the crafted payload as the Land Property Type value through a POST request to /admin/add-propertytype.php. Step 3: Server-Side Processing: The server-side script /admin/add-propertytype.php receives the malicious input. Step 4: Insufficient Sanitization: The script fails to properly sanitize or encode the input. Step 5: Response Generation: The server generates an HTML response that includes the unsanitized Land Property Type value. Step 6: Client-Side Execution: The victim's browser receives the malicious HTML response. The injected JavaScript code is executed within the context of the website, leading to XSS.

03 // Deep Technical Analysis

The vulnerability stems from insufficient input validation and output encoding within the /admin/add-propertytype.php file. Specifically, the application fails to properly sanitize user-supplied input for the Land Property Type parameter before rendering it in the HTML response. This allows an attacker to inject arbitrary HTML and JavaScript code, which is then executed by the victim's browser. The root cause is a lack of input validation and output encoding (e.g., HTML entity encoding) on the user-supplied input. This allows for the execution of malicious scripts within the context of the vulnerable website, leading to XSS.

04 // Exploitation Status

Public PoC. The vulnerability has been disclosed publicly, and proof-of-concept (PoC) exploits are likely available. This increases the risk of exploitation significantly.

05 // Threat Intelligence

While no specific APTs or malware are directly linked to this CVE at this time, the availability of a public PoC makes this vulnerability attractive to a wide range of attackers, including those seeking to establish a foothold for further attacks. This vulnerability is not currently listed on the CISA KEV.

06 // Detection & Hunting

  • Web application firewall (WAF) logs showing suspicious requests containing HTML or JavaScript tags in the Land Property Type parameter.

  • Network traffic analysis identifying POST requests to /admin/add-propertytype.php with unusual payloads in the request body.

  • Server-side logs from the webserver (e.g., Apache, Nginx) showing requests to /admin/add-propertytype.php with potentially malicious input.

  • Security Information and Event Management (SIEM) systems configured to alert on XSS patterns.

07 // Remediation & Hardening

  • Implement robust input validation to filter out potentially malicious characters and patterns in the Land Property Type field. Specifically, validate the input against a whitelist of acceptable characters.

  • Apply output encoding (e.g., HTML entity encoding) to the Land Property Type value before rendering it in the HTML response. This prevents the browser from interpreting the injected code as HTML.

  • Use a Content Security Policy (CSP) to restrict the sources from which the browser can load resources, mitigating the impact of successful XSS attacks.

  • Regularly update the PHPGurukul Land Record System to the latest version or apply any available security patches.

  • Conduct thorough penetration testing and vulnerability assessments to identify and address security weaknesses.

08 // Affected Products

PHPGurukul Land Record System 1.0
Advertisement