CVE-2024-29273: n/a
There is Stored Cross-Site Scripting (XSS) in dzzoffice 2.02.1 SC UTF8 in uploadfile to index.php, with the XSS payload in an SVG document.
AI Analysis
Technical Summary
CVE-2024-29273 is a stored cross-site scripting (XSS) vulnerability affecting dzzoffice version 2.02.1 SC UTF8. The vulnerability resides in the uploadfile parameter handled by index.php, where an attacker can upload an SVG document containing malicious JavaScript payloads. Because the payload is stored, it will be executed whenever a user accesses the affected page, leading to persistent XSS. This vulnerability stems from improper sanitization and validation of SVG content, allowing script injection within the SVG XML structure. The attack vector is network-based, requiring no authentication but does require user interaction to trigger the payload execution. The vulnerability impacts confidentiality and integrity by enabling attackers to steal session tokens, perform actions on behalf of users, or manipulate displayed content. Availability is not impacted. The CVSS 3.1 score is 6.1, indicating medium severity due to ease of exploitation and scope affecting user sessions. No patches or known exploits are currently reported, but the vulnerability is publicly disclosed. The CWE classification is CWE-79, which covers improper neutralization of input leading to XSS.
Potential Impact
This vulnerability can lead to unauthorized script execution in the browsers of users interacting with the vulnerable dzzoffice instance. Potential impacts include theft of authentication cookies or tokens, session hijacking, defacement of web content, and execution of arbitrary actions with the victim's privileges. For organizations, this could result in compromised user accounts, data leakage, and erosion of trust in the affected service. Since dzzoffice is a collaborative office platform, attackers could leverage this to manipulate documents or steal sensitive information. Although availability is not affected, the confidentiality and integrity impacts can be significant, especially in environments with sensitive or proprietary data. The lack of authentication requirement broadens the attack surface, allowing remote attackers to target any user who views the malicious SVG upload. This could facilitate targeted phishing campaigns or broader exploitation in organizations using dzzoffice.
Mitigation Recommendations
Until an official patch is released, organizations should implement several specific mitigations: 1) Restrict file upload types strictly, disallowing SVG uploads or any file types that can contain executable scripts. 2) Employ server-side sanitization of SVG files to remove any embedded scripts or potentially dangerous XML elements before storage or rendering. 3) Implement Content Security Policy (CSP) headers to limit script execution sources and reduce the impact of XSS payloads. 4) Educate users to be cautious with unexpected or suspicious file uploads and links. 5) Monitor web server logs and application behavior for unusual upload activity or script execution attempts. 6) Consider deploying web application firewalls (WAFs) with rules to detect and block XSS payloads in uploads. 7) Isolate or sandbox the affected application environment to limit lateral movement if exploitation occurs. 8) Regularly review and update security controls related to file handling and input validation. These measures will reduce the risk of exploitation while awaiting an official fix from the vendor.
Affected Countries
China, United States, India, Germany, France, United Kingdom, Japan, South Korea, Russia, Brazil
CVE-2024-29273: n/a
Description
There is Stored Cross-Site Scripting (XSS) in dzzoffice 2.02.1 SC UTF8 in uploadfile to index.php, with the XSS payload in an SVG document.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-29273 is a stored cross-site scripting (XSS) vulnerability affecting dzzoffice version 2.02.1 SC UTF8. The vulnerability resides in the uploadfile parameter handled by index.php, where an attacker can upload an SVG document containing malicious JavaScript payloads. Because the payload is stored, it will be executed whenever a user accesses the affected page, leading to persistent XSS. This vulnerability stems from improper sanitization and validation of SVG content, allowing script injection within the SVG XML structure. The attack vector is network-based, requiring no authentication but does require user interaction to trigger the payload execution. The vulnerability impacts confidentiality and integrity by enabling attackers to steal session tokens, perform actions on behalf of users, or manipulate displayed content. Availability is not impacted. The CVSS 3.1 score is 6.1, indicating medium severity due to ease of exploitation and scope affecting user sessions. No patches or known exploits are currently reported, but the vulnerability is publicly disclosed. The CWE classification is CWE-79, which covers improper neutralization of input leading to XSS.
Potential Impact
This vulnerability can lead to unauthorized script execution in the browsers of users interacting with the vulnerable dzzoffice instance. Potential impacts include theft of authentication cookies or tokens, session hijacking, defacement of web content, and execution of arbitrary actions with the victim's privileges. For organizations, this could result in compromised user accounts, data leakage, and erosion of trust in the affected service. Since dzzoffice is a collaborative office platform, attackers could leverage this to manipulate documents or steal sensitive information. Although availability is not affected, the confidentiality and integrity impacts can be significant, especially in environments with sensitive or proprietary data. The lack of authentication requirement broadens the attack surface, allowing remote attackers to target any user who views the malicious SVG upload. This could facilitate targeted phishing campaigns or broader exploitation in organizations using dzzoffice.
Mitigation Recommendations
Until an official patch is released, organizations should implement several specific mitigations: 1) Restrict file upload types strictly, disallowing SVG uploads or any file types that can contain executable scripts. 2) Employ server-side sanitization of SVG files to remove any embedded scripts or potentially dangerous XML elements before storage or rendering. 3) Implement Content Security Policy (CSP) headers to limit script execution sources and reduce the impact of XSS payloads. 4) Educate users to be cautious with unexpected or suspicious file uploads and links. 5) Monitor web server logs and application behavior for unusual upload activity or script execution attempts. 6) Consider deploying web application firewalls (WAFs) with rules to detect and block XSS payloads in uploads. 7) Isolate or sandbox the affected application environment to limit lateral movement if exploitation occurs. 8) Regularly review and update security controls related to file handling and input validation. These measures will reduce the risk of exploitation while awaiting an official fix from the vendor.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-03-19T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6d9bb7ef31ef0b589451
Added to database: 2/25/2026, 9:46:03 PM
Last enriched: 2/26/2026, 11:31:49 AM
Last updated: 4/12/2026, 2:35:36 PM
Views: 11
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.