Lucene search

K
cveGitHub_MCVE-2024-29022
HistoryApr 12, 2024 - 9:15 p.m.

CVE-2024-29022

2024-04-1221:15:11
CWE-79
CWE-117
GitHub_M
web.nvd.nist.gov
27
xibo
open source
digital signage
web content
management
windows
display
session
injection
exfiltration
upgrade
patch
cms
security support

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

6.4

Confidence

High

EPSS

0

Percentile

15.5%

Xibo is an Open Source Digital Signage platform with a web content management system and Windows display player software. In affected versions some request headers are not correctly sanitised when stored in the session and display tables. These headers can be used to inject a malicious script into the session page to exfiltrate session IDs and User Agents. These session IDs / User Agents can subsequently be used to hijack active sessions. A malicious script can be injected into the display grid to exfiltrate information related to displays. Users should upgrade to version 3.3.10 or 4.0.9 which fix this issue. Customers who host their CMS with the Xibo Signage service have already received an upgrade or patch to resolve this issue regardless of the CMS version that they are running. Upgrading to a fixed version is necessary to remediate. Patches are available for earlier versions of Xibo CMS that are out of security support: 2.3 patch ebeccd000b51f00b9a25f56a2f252d6812ebf850.diff. 1.8 patch a81044e6ccdd92cc967e34c125bd8162432e51bc.diff. There are no known workarounds for this issue.

Affected configurations

Vulners
Vulnrichment
Node
xibosignagexibo_cmsRange1.8.03.3.10
OR
xibosignagexibo_cmsRange4.0.04.0.9
VendorProductVersionCPE
xibosignagexibo_cms*cpe:2.3:a:xibosignage:xibo_cms:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "xibosignage",
    "product": "xibo-cms",
    "versions": [
      {
        "version": ">=1.8.0, < 3.3.10",
        "status": "affected"
      },
      {
        "version": ">= 4.0.0, < 4.0.9",
        "status": "affected"
      }
    ]
  }
]

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

6.4

Confidence

High

EPSS

0

Percentile

15.5%

Related for CVE-2024-29022