Skip to main content

CVE-2024-21393: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Microsoft Microsoft Dynamics 365 (on-premises) version 9.1

High
VulnerabilityCVE-2024-21393cvecve-2024-21393cwe-79
Published: Tue Feb 13 2024 (02/13/2024, 18:02:21 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Microsoft Dynamics 365 (on-premises) version 9.1

Description

Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability

AI-Powered Analysis

AILast updated: 06/26/2025, 08:05:35 UTC

Technical Analysis

CVE-2024-21393 is a high-severity Cross-site Scripting (XSS) vulnerability identified in Microsoft Dynamics 365 (on-premises) version 9.1, with affected versions including 9.0. The vulnerability is classified under CWE-79, which involves improper neutralization of input during web page generation. This flaw allows an attacker with low privileges (PR:L) to execute malicious scripts in the context of the affected web application. The vulnerability requires user interaction (UI:R), such as a victim clicking a crafted link or visiting a malicious page, to trigger the exploit. The attack vector is network-based (AV:N), meaning exploitation can be attempted remotely over the network without physical access. The vulnerability impacts confidentiality significantly (C:H), with limited impact on integrity (I:L) and no impact on availability (A:N). The scope is changed (S:C), indicating that the vulnerability affects resources beyond the initially vulnerable component, potentially impacting other components or users. No known exploits are currently reported in the wild, but the vulnerability has been publicly disclosed and assigned a CVSS 3.1 score of 7.6, reflecting its high severity. The vulnerability arises from insufficient input validation or sanitization in the Dynamics 365 on-premises web interface, allowing injection of malicious scripts that execute in the context of authenticated users, potentially leading to session hijacking, data theft, or unauthorized actions within the application. Given the nature of Dynamics 365 as a widely used enterprise resource planning (ERP) and customer relationship management (CRM) platform, exploitation could lead to significant exposure of sensitive business data and disruption of business processes.

Potential Impact

For European organizations, this vulnerability poses a substantial risk due to the widespread adoption of Microsoft Dynamics 365 in various sectors including finance, manufacturing, retail, and public administration. Successful exploitation could lead to unauthorized disclosure of confidential customer and business data, undermining data protection obligations under GDPR. The XSS vulnerability could facilitate phishing attacks, session hijacking, or unauthorized command execution within the Dynamics 365 environment, potentially leading to fraud, data manipulation, or reputational damage. Since the vulnerability affects on-premises deployments, organizations with less frequent patch cycles or limited security monitoring might be particularly vulnerable. The impact is heightened in regulated industries where data integrity and confidentiality are paramount. Additionally, the changed scope of the vulnerability suggests that exploitation could affect multiple users or components, increasing the potential damage. The absence of known exploits in the wild provides a window for proactive mitigation, but also indicates that attackers may develop exploits soon after disclosure, emphasizing the need for prompt action.

Mitigation Recommendations

European organizations should prioritize the following specific mitigation steps: 1) Immediate assessment of their Dynamics 365 on-premises deployment versions to identify if version 9.0 or 9.1 is in use. 2) Apply any available security patches or updates from Microsoft as soon as they are released; if patches are not yet available, implement temporary mitigations such as input validation and output encoding at the application level to reduce XSS risk. 3) Enforce strict Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts within the Dynamics 365 web interface. 4) Conduct thorough security reviews and penetration testing focused on web interface input handling to identify and remediate similar injection points. 5) Educate users about the risks of clicking on suspicious links and implement multi-factor authentication (MFA) to reduce the impact of session hijacking. 6) Monitor logs and network traffic for unusual activities indicative of exploitation attempts. 7) Limit user privileges to the minimum necessary to reduce the attack surface. 8) Consider deploying Web Application Firewalls (WAF) with rules tuned to detect and block XSS payloads targeting Dynamics 365 endpoints. These measures, combined with timely patching, will significantly reduce the risk posed by this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2023-12-08T22:45:20.454Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9836c4522896dcbeac1a

Added to database: 5/21/2025, 9:09:10 AM

Last enriched: 6/26/2025, 8:05:35 AM

Last updated: 7/28/2025, 8:45:15 PM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats