Skip to main content

CVE-2024-22876: n/a in n/a

Medium
VulnerabilityCVE-2024-22876cvecve-2024-22876
Published: Fri Jan 19 2024 (01/19/2024, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: n/a
Product: n/a

Description

StrangeBee TheHive 5.1.0 to 5.1.9 and 5.2.0 to 5.2.8 is vulnerable to Cross Site Scripting (XSS) in the case attachment functionality which enables an attacker to upload a malicious HTML file with Javascript code that will be executed in the context of the The Hive application using a specific URL. The vulnerability can be used to coerce a victim account to perform specific actions on the application as helping an analyst becoming administrator.

AI-Powered Analysis

AILast updated: 07/10/2025, 22:31:29 UTC

Technical Analysis

CVE-2024-22876 is a Cross Site Scripting (XSS) vulnerability affecting TheHive versions 5.1.0 through 5.1.9 and 5.2.0 through 5.2.8. The vulnerability arises in the case attachment functionality, where an attacker can upload a malicious HTML file containing JavaScript code. When a victim accesses a specific URL referencing this malicious attachment, the embedded JavaScript executes within the security context of TheHive application. This enables the attacker to perform actions on behalf of the victim user, potentially escalating privileges from an analyst role to an administrator. The vulnerability is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation), indicating insufficient sanitization or validation of user-supplied input in the attachment handling process. The CVSS v3.1 base score is 5.4 (medium severity), with the vector AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N, meaning the attack can be launched remotely over the network with low attack complexity, requires the attacker to have some privileges (analyst level), and requires user interaction (victim must open the malicious URL). The impact includes limited confidentiality and integrity loss but no availability impact. No known exploits are reported in the wild yet, and no official patches are linked in the provided data, suggesting organizations should monitor vendor advisories closely. The vulnerability’s scope is changed (S:C), indicating that exploitation affects resources beyond the initially vulnerable component, such as privilege escalation within the application.

Potential Impact

For European organizations using TheHive as a security incident response platform, this vulnerability poses a significant risk. TheHive is widely used by CERTs, SOCs, and security teams for managing and analyzing security incidents. Successful exploitation could allow an attacker to escalate privileges within the platform, potentially gaining administrative control. This could lead to unauthorized access to sensitive incident data, manipulation or deletion of case records, and disruption of incident response workflows. Given TheHive’s role in coordinating security operations, such compromise could delay or misdirect incident handling, increasing the risk of broader security breaches. Confidentiality and integrity of incident data are at risk, which is critical for compliance with European data protection regulations such as GDPR. The requirement for user interaction (clicking a malicious link) means phishing or social engineering campaigns could be used to trigger the exploit, a common attack vector in Europe. Although no active exploitation is reported, the medium severity and privilege escalation potential warrant proactive mitigation.

Mitigation Recommendations

European organizations should immediately review their use of TheHive versions 5.1.0 to 5.1.9 and 5.2.0 to 5.2.8 and plan for prompt upgrading once vendor patches are released. In the interim, implement strict input validation and sanitization on file uploads, especially for attachments, to block HTML or script content. Restrict attachment types to safe formats (e.g., PDF, images) and disable rendering of HTML attachments within the application interface. Enforce the principle of least privilege by limiting analyst permissions and monitoring for unusual privilege escalations. Implement web application firewalls (WAFs) with rules to detect and block XSS payloads targeting TheHive URLs. Educate users on phishing risks and suspicious link handling to reduce the chance of user interaction with malicious URLs. Regularly audit TheHive logs for anomalous activity indicative of exploitation attempts. Finally, maintain close communication with TheHive developers or community for timely patch releases and advisories.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-01-11T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68487f5b1b0bd07c3938c870

Added to database: 6/10/2025, 6:54:19 PM

Last enriched: 7/10/2025, 10:31:29 PM

Last updated: 8/10/2025, 9:11:12 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats