Skip to main content

CVE-2023-49572: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Flexense VX Search Enterprise

High
VulnerabilityCVE-2023-49572cvecve-2023-49572cwe-79
Published: Fri May 24 2024 (05/24/2024, 12:39:32 UTC)
Source: CVE
Vendor/Project: Flexense
Product: VX Search Enterprise

Description

A vulnerability has been discovered in VX Search Enterprise affecting version 10.2.14, and in Disk Pulse Enterprise 10.4.18 version, that could allow an attacker to execute persistent XSS through /setup_odbc in odbc_data_source, odbc_user and odbc_password parameters. This vulnerability could allow an attacker to store malicious JavaScript payloads on the system to be triggered when the page loads.

AI-Powered Analysis

AILast updated: 07/06/2025, 05:27:48 UTC

Technical Analysis

CVE-2023-49572 is a high-severity vulnerability classified under CWE-79 (Improper Neutralization of Input During Web Page Generation), commonly known as Cross-site Scripting (XSS). This vulnerability affects Flexense's VX Search Enterprise version 10.2.14 and Disk Pulse Enterprise version 10.4.18. The flaw exists in the web interface endpoint /setup_odbc, specifically in the handling of the parameters odbc_data_source, odbc_user, and odbc_password. An attacker can exploit this vulnerability by injecting malicious JavaScript payloads into these parameters, which are then stored persistently on the system. When a legitimate user accesses the affected page, the malicious script executes in their browser context. The CVSS 3.1 base score is 7.1, indicating a high severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability affects components beyond the initially vulnerable component. The impact affects confidentiality, integrity, and availability at a low to moderate level (C:L/I:L/A:L). Persistent XSS can lead to session hijacking, credential theft, unauthorized actions on behalf of users, or distribution of malware. Although no known exploits are currently reported in the wild, the vulnerability's nature and ease of exploitation make it a significant risk. The lack of available patches at the time of publication increases the urgency for mitigation. The vulnerability is particularly critical in environments where VX Search Enterprise or Disk Pulse Enterprise are used to manage or analyze sensitive data, as attackers could leverage the XSS to escalate attacks within the network or exfiltrate data.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially to enterprises relying on Flexense's VX Search Enterprise or Disk Pulse Enterprise for file analysis and data management. Successful exploitation could lead to unauthorized access to sensitive information, session hijacking of administrative users, and potential lateral movement within corporate networks. This could result in data breaches, compliance violations (e.g., GDPR), and operational disruptions. Given the persistent nature of the XSS, attackers could maintain a foothold or deliver secondary payloads over time. Organizations in sectors such as finance, healthcare, government, and critical infrastructure, which often handle sensitive personal or operational data, are particularly vulnerable. The cross-site scripting vulnerability also undermines user trust and could lead to reputational damage if exploited. The requirement for user interaction means phishing or social engineering could be used to trigger the exploit, increasing the attack surface. The vulnerability's network accessibility means it can be exploited remotely without authentication, broadening the potential attacker base.

Mitigation Recommendations

1. Immediate mitigation should include restricting access to the /setup_odbc endpoint to trusted administrators only, ideally via network segmentation or VPN access. 2. Implement strict input validation and output encoding on the affected parameters (odbc_data_source, odbc_user, odbc_password) to neutralize malicious scripts. 3. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in the web application context. 4. Monitor web server logs for unusual or suspicious requests targeting /setup_odbc parameters to detect potential exploitation attempts. 5. Educate users and administrators about the risks of phishing and social engineering that could trigger the XSS payload. 6. Regularly update and patch the affected software once Flexense releases a security update addressing this vulnerability. 7. Consider deploying Web Application Firewalls (WAFs) with rules to detect and block XSS payloads targeting the affected endpoints. 8. Conduct thorough security assessments and penetration tests focusing on web interfaces to identify similar injection flaws. 9. Limit user privileges and enforce the principle of least privilege to reduce the impact of any successful exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
INCIBE
Date Reserved
2023-11-27T15:14:26.602Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682dbb0ac4522896dcbfbbd5

Added to database: 5/21/2025, 11:37:46 AM

Last enriched: 7/6/2025, 5:27:48 AM

Last updated: 7/27/2025, 12:51:50 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats