leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-249502 is the identifier assigned to this vulnerability.","datePublished":"2024-01-02T18:00:04.652Z","dateModified":"2025-08-13T02:41:07.839Z","url":"https://radar.offseq.com/threat/cve-2024-0189-cwe-79-cross-site-scripting-in-rrj-nueva-ecija-engineer-online-portal-bd73d2","author":{"@type":"Organization","name":"OffSeq Threat Intelligence","url":"https://radar.offseq.com"},"publisher":{"@type":"Organization","name":"OffSeq","logo":{"@type":"ImageObject","url":"https://radar.offseq.com/favicon.png"}},"mainEntityOfPage":{"@type":"WebPage","@id":"https://radar.offseq.com/threat/cve-2024-0189-cwe-79-cross-site-scripting-in-rrj-nueva-ecija-engineer-online-portal-bd73d2"},"identifier":"CVE-2024-0189","contentRating":"LOW","keywords":"cve,cve-2024-0189,cwe-79"}
Skip to main content

CVE-2024-0189: CWE-79 Cross Site Scripting in RRJ Nueva Ecija Engineer Online Portal

Low
VulnerabilityCVE-2024-0189cvecve-2024-0189cwe-79
Published: Tue Jan 02 2024 (01/02/2024, 18:00:04 UTC)
Source: CVE
Vendor/Project: RRJ
Product: Nueva Ecija Engineer Online Portal

Description

A vulnerability has been found in RRJ Nueva Ecija Engineer Online Portal 1.0 and classified as problematic. This vulnerability affects unknown code of the file teacher_message.php of the component Create Message Handler. The manipulation of the argument Content with the input </title><scRipt>alert(x)</scRipt> leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-249502 is the identifier assigned to this vulnerability.

AI-Powered Analysis

AILast updated: 07/04/2025, 23:54:58 UTC

Technical Analysis

CVE-2024-0189 is a Cross-Site Scripting (XSS) vulnerability identified in version 1.0 of the RRJ Nueva Ecija Engineer Online Portal, specifically within the 'teacher_message.php' file's Create Message Handler component. The vulnerability arises from improper sanitization of the 'Content' parameter, which allows an attacker to inject malicious JavaScript code, exemplified by the payload '</title><scRipt>alert(x)</scRipt>'. This input is not properly neutralized, enabling script execution in the context of the victim's browser. The attack vector is remote, requiring only that the attacker craft a malicious request to the vulnerable parameter. Exploitation requires some level of privileges (PR:L) and user interaction (UI:R), indicating that the attacker must have limited privileges and the victim must interact with the malicious content, such as clicking a link or viewing a message. The vulnerability does not affect confidentiality or availability but impacts integrity by allowing script injection that could manipulate the user interface or perform actions on behalf of the user. The CVSS 3.1 base score is 3.5, categorized as low severity. No patches have been published yet, and no known exploits are currently active in the wild. The vulnerability is publicly disclosed, which raises the risk of exploitation if not mitigated promptly.

Potential Impact

For European organizations, the direct impact of this XSS vulnerability is relatively limited due to its low severity score and the requirement for user interaction and some privilege level. However, if the RRJ Nueva Ecija Engineer Online Portal or similar systems are used within European educational or engineering institutions, attackers could exploit this flaw to conduct targeted phishing, session hijacking, or defacement attacks against users. This could lead to reputational damage, unauthorized actions performed by users, or the spread of malware via injected scripts. While the vulnerability does not directly compromise sensitive data confidentiality or system availability, it undermines user trust and could serve as a foothold for more complex attacks if combined with other vulnerabilities. The lack of a patch increases the urgency for organizations to implement compensating controls. Given the portal's niche usage, the broader European impact is likely limited unless the software is adopted by institutions within the region.

Mitigation Recommendations

Organizations using the RRJ Nueva Ecija Engineer Online Portal should immediately implement input validation and output encoding on the 'Content' parameter to neutralize malicious scripts. Employing a web application firewall (WAF) with custom rules to detect and block suspicious script tags or payloads can provide an interim defense. Administrators should restrict user privileges to the minimum necessary to reduce exploitation potential. Educating users about the risks of interacting with untrusted content within the portal can reduce successful exploitation. Monitoring logs for unusual activities related to message creation or script injection attempts is advisable. Since no official patch is available, organizations should engage with the vendor for a timeline on remediation and consider code review or third-party security assessments to identify and fix similar issues. Additionally, adopting Content Security Policy (CSP) headers can mitigate the impact of XSS by restricting script execution sources.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2024-01-02T10:22:40.324Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9817c4522896dcbd73d2

Added to database: 5/21/2025, 9:08:39 AM

Last enriched: 7/4/2025, 11:54:58 PM

Last updated: 8/13/2025, 2:41:07 AM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats