Skip to main content

CVE-2024-0599: CWE-79 Cross Site Scripting in Jspxcms

Low
VulnerabilityCVE-2024-0599cvecve-2024-0599cwe-79
Published: Tue Jan 16 2024 (01/16/2024, 20:00:05 UTC)
Source: CVE
Vendor/Project: n/a
Product: Jspxcms

Description

A vulnerability was found in Jspxcms 10.2.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file src\main\java\com\jspxcms\core\web\back\InfoController.java of the component Document Management Page. The manipulation of the argument title leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-250837 was assigned to this vulnerability.

AI-Powered Analysis

AILast updated: 07/05/2025, 01:57:51 UTC

Technical Analysis

CVE-2024-0599 is a Cross Site Scripting (XSS) vulnerability identified in Jspxcms version 10.2.0, specifically within the Document Management Page component. The vulnerability arises from improper handling of the 'title' argument in the InfoController.java file, allowing an attacker to inject malicious scripts. This flaw is classified under CWE-79, which pertains to improper neutralization of input during web page generation, leading to script injection. The vulnerability can be exploited remotely, requiring low attack complexity but does require some level of privileges (PR:L) and user interaction (UI:R). The CVSS v3.1 base score is 3.5, indicating a low severity level primarily due to limited impact on confidentiality and availability, with integrity impact being low. The vulnerability does not require authentication to be exploited but does require user interaction, such as a victim clicking a crafted link or visiting a malicious page. No public exploits are currently known in the wild, but the vulnerability details have been disclosed publicly, increasing the risk of exploitation. The lack of an official patch link suggests that remediation may require manual mitigation or awaiting an official update from the vendor. Given the nature of XSS, successful exploitation could allow attackers to execute arbitrary scripts in the context of the victim's browser, potentially leading to session hijacking, defacement, or redirection to malicious sites, but it does not directly compromise server confidentiality or availability.

Potential Impact

For European organizations using Jspxcms 10.2.0, this vulnerability poses a risk primarily to web application users and administrators. The impact is mostly on the integrity of the user experience and trustworthiness of the affected web portals. Attackers could exploit this XSS flaw to conduct phishing attacks, steal session cookies, or perform actions on behalf of authenticated users, potentially leading to unauthorized access or data manipulation within the application context. While the direct impact on backend systems or sensitive data confidentiality is limited, the reputational damage and potential regulatory implications under GDPR for failing to protect user data and prevent malicious script execution could be significant. Organizations operating public-facing websites or intranet portals with Jspxcms are at risk of targeted attacks exploiting this vulnerability, especially if user interaction can be engineered via social engineering or phishing campaigns. The low CVSS score reflects limited direct damage but does not diminish the importance of addressing the vulnerability to maintain user trust and compliance with European data protection standards.

Mitigation Recommendations

1. Immediate mitigation should include input validation and output encoding on the 'title' parameter within the InfoController.java to neutralize any injected scripts. 2. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the browser context. 3. Implement web application firewalls (WAF) with rules to detect and block common XSS payloads targeting the affected endpoint. 4. Educate users and administrators about the risks of clicking on suspicious links or interacting with untrusted content. 5. Monitor web server logs for unusual requests or patterns indicative of attempted exploitation. 6. Coordinate with the Jspxcms vendor or community to obtain or develop an official patch and apply it promptly once available. 7. Conduct regular security assessments and penetration testing focused on XSS vulnerabilities to identify and remediate similar issues proactively. 8. Review and harden authentication and session management mechanisms to minimize the impact of potential session hijacking.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2024-01-16T15:15:15.436Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9817c4522896dcbd7896

Added to database: 5/21/2025, 9:08:39 AM

Last enriched: 7/5/2025, 1:57:51 AM

Last updated: 8/14/2025, 10:36:30 PM

Views: 18

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats