CVE-2024-0773: CWE-79 Cross Site Scripting in CodeAstro Internet Banking System
A vulnerability classified as problematic was found in CodeAstro Internet Banking System 1.0. Affected by this vulnerability is an unknown functionality of the file pages_client_signup.php. The manipulation of the argument Client Full Name leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-251677 was assigned to this vulnerability.
AI Analysis
Technical Summary
CVE-2024-0773 is a cross-site scripting (XSS) vulnerability identified in version 1.0 of the CodeAstro Internet Banking System. The vulnerability resides in the pages_client_signup.php file, specifically in the handling of the 'Client Full Name' input parameter. Improper sanitization or validation of this input allows an attacker to inject malicious scripts that execute in the context of the victim's browser. This type of vulnerability is classified under CWE-79, which covers improper neutralization of input leading to script injection. The attack can be launched remotely without requiring prior authentication, but it does require user interaction, such as a victim clicking a crafted link or submitting a malicious form. The CVSS 3.1 base score is 3.5, indicating a low severity level, with the vector string AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N. This means the attack is network exploitable with low attack complexity, requires low privileges, and user interaction is necessary. The impact is limited to integrity, with no direct confidentiality or availability impact. No public exploits are currently known in the wild, but the vulnerability details have been disclosed publicly, which could facilitate exploitation attempts. No patches or fixes have been linked yet, so affected organizations need to implement mitigations to reduce risk. Given the nature of the vulnerability, attackers could use it to execute scripts that manipulate user sessions, perform phishing, or conduct other client-side attacks within the banking system interface.
Potential Impact
For European organizations using CodeAstro Internet Banking System 1.0, this vulnerability could allow attackers to perform targeted XSS attacks against bank customers or internal users. Although the direct impact on confidentiality and availability is minimal, the integrity compromise could lead to session hijacking, fraudulent transactions, or phishing attacks that undermine user trust and regulatory compliance. Financial institutions in Europe are subject to strict data protection and cybersecurity regulations such as GDPR and PSD2, which mandate strong security controls. Exploitation of this vulnerability could result in reputational damage, regulatory fines, and financial losses. Since the vulnerability requires user interaction, social engineering campaigns could be used to increase attack success. The lack of a patch increases the urgency for organizations to apply compensating controls. The risk is heightened in environments where the affected system is exposed to external users or integrated with other critical banking infrastructure.
Mitigation Recommendations
1. Implement strict input validation and output encoding on the 'Client Full Name' field to neutralize any injected scripts. 2. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the browser context. 3. Use web application firewalls (WAFs) with rules tailored to detect and block XSS payloads targeting the signup page. 4. Educate users and staff about phishing and social engineering risks associated with XSS attacks. 5. Monitor logs for unusual input patterns or repeated attempts to exploit the signup functionality. 6. Isolate the affected system from other critical banking systems until a vendor patch is available. 7. Engage with the vendor to obtain or expedite a security patch and apply it promptly once released. 8. Conduct regular security assessments and penetration testing focusing on input validation and client-side vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2024-0773: CWE-79 Cross Site Scripting in CodeAstro Internet Banking System
Description
A vulnerability classified as problematic was found in CodeAstro Internet Banking System 1.0. Affected by this vulnerability is an unknown functionality of the file pages_client_signup.php. The manipulation of the argument Client Full Name leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-251677 was assigned to this vulnerability.
AI-Powered Analysis
Technical Analysis
CVE-2024-0773 is a cross-site scripting (XSS) vulnerability identified in version 1.0 of the CodeAstro Internet Banking System. The vulnerability resides in the pages_client_signup.php file, specifically in the handling of the 'Client Full Name' input parameter. Improper sanitization or validation of this input allows an attacker to inject malicious scripts that execute in the context of the victim's browser. This type of vulnerability is classified under CWE-79, which covers improper neutralization of input leading to script injection. The attack can be launched remotely without requiring prior authentication, but it does require user interaction, such as a victim clicking a crafted link or submitting a malicious form. The CVSS 3.1 base score is 3.5, indicating a low severity level, with the vector string AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N. This means the attack is network exploitable with low attack complexity, requires low privileges, and user interaction is necessary. The impact is limited to integrity, with no direct confidentiality or availability impact. No public exploits are currently known in the wild, but the vulnerability details have been disclosed publicly, which could facilitate exploitation attempts. No patches or fixes have been linked yet, so affected organizations need to implement mitigations to reduce risk. Given the nature of the vulnerability, attackers could use it to execute scripts that manipulate user sessions, perform phishing, or conduct other client-side attacks within the banking system interface.
Potential Impact
For European organizations using CodeAstro Internet Banking System 1.0, this vulnerability could allow attackers to perform targeted XSS attacks against bank customers or internal users. Although the direct impact on confidentiality and availability is minimal, the integrity compromise could lead to session hijacking, fraudulent transactions, or phishing attacks that undermine user trust and regulatory compliance. Financial institutions in Europe are subject to strict data protection and cybersecurity regulations such as GDPR and PSD2, which mandate strong security controls. Exploitation of this vulnerability could result in reputational damage, regulatory fines, and financial losses. Since the vulnerability requires user interaction, social engineering campaigns could be used to increase attack success. The lack of a patch increases the urgency for organizations to apply compensating controls. The risk is heightened in environments where the affected system is exposed to external users or integrated with other critical banking infrastructure.
Mitigation Recommendations
1. Implement strict input validation and output encoding on the 'Client Full Name' field to neutralize any injected scripts. 2. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the browser context. 3. Use web application firewalls (WAFs) with rules tailored to detect and block XSS payloads targeting the signup page. 4. Educate users and staff about phishing and social engineering risks associated with XSS attacks. 5. Monitor logs for unusual input patterns or repeated attempts to exploit the signup functionality. 6. Isolate the affected system from other critical banking systems until a vendor patch is available. 7. Engage with the vendor to obtain or expedite a security patch and apply it promptly once released. 8. Conduct regular security assessments and penetration testing focusing on input validation and client-side vulnerabilities.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2024-01-21T09:18:24.937Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6839c41d182aa0cae2b435bd
Added to database: 5/30/2025, 2:43:41 PM
Last enriched: 7/8/2025, 4:44:10 PM
Last updated: 7/26/2025, 8:07:43 PM
Views: 14
Related Threats
CVE-2025-43735: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Liferay Portal
MediumCVE-2025-40770: CWE-300: Channel Accessible by Non-Endpoint in Siemens SINEC Traffic Analyzer
HighCVE-2025-40769: CWE-1164: Irrelevant Code in Siemens SINEC Traffic Analyzer
HighCVE-2025-40768: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Siemens SINEC Traffic Analyzer
HighCVE-2025-40767: CWE-250: Execution with Unnecessary Privileges in Siemens SINEC Traffic Analyzer
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.