Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-29273: n/a

0
Medium
VulnerabilityCVE-2024-29273cvecve-2024-29273
Published: Fri Mar 22 2024 (03/22/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

There is Stored Cross-Site Scripting (XSS) in dzzoffice 2.02.1 SC UTF8 in uploadfile to index.php, with the XSS payload in an SVG document.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 11:31:49 UTC

Technical Analysis

CVE-2024-29273 is a stored cross-site scripting (XSS) vulnerability affecting dzzoffice version 2.02.1 SC UTF8. The vulnerability resides in the uploadfile parameter handled by index.php, where an attacker can upload an SVG document containing malicious JavaScript payloads. Because the payload is stored, it will be executed whenever a user accesses the affected page, leading to persistent XSS. This vulnerability stems from improper sanitization and validation of SVG content, allowing script injection within the SVG XML structure. The attack vector is network-based, requiring no authentication but does require user interaction to trigger the payload execution. The vulnerability impacts confidentiality and integrity by enabling attackers to steal session tokens, perform actions on behalf of users, or manipulate displayed content. Availability is not impacted. The CVSS 3.1 score is 6.1, indicating medium severity due to ease of exploitation and scope affecting user sessions. No patches or known exploits are currently reported, but the vulnerability is publicly disclosed. The CWE classification is CWE-79, which covers improper neutralization of input leading to XSS.

Potential Impact

This vulnerability can lead to unauthorized script execution in the browsers of users interacting with the vulnerable dzzoffice instance. Potential impacts include theft of authentication cookies or tokens, session hijacking, defacement of web content, and execution of arbitrary actions with the victim's privileges. For organizations, this could result in compromised user accounts, data leakage, and erosion of trust in the affected service. Since dzzoffice is a collaborative office platform, attackers could leverage this to manipulate documents or steal sensitive information. Although availability is not affected, the confidentiality and integrity impacts can be significant, especially in environments with sensitive or proprietary data. The lack of authentication requirement broadens the attack surface, allowing remote attackers to target any user who views the malicious SVG upload. This could facilitate targeted phishing campaigns or broader exploitation in organizations using dzzoffice.

Mitigation Recommendations

Until an official patch is released, organizations should implement several specific mitigations: 1) Restrict file upload types strictly, disallowing SVG uploads or any file types that can contain executable scripts. 2) Employ server-side sanitization of SVG files to remove any embedded scripts or potentially dangerous XML elements before storage or rendering. 3) Implement Content Security Policy (CSP) headers to limit script execution sources and reduce the impact of XSS payloads. 4) Educate users to be cautious with unexpected or suspicious file uploads and links. 5) Monitor web server logs and application behavior for unusual upload activity or script execution attempts. 6) Consider deploying web application firewalls (WAFs) with rules to detect and block XSS payloads in uploads. 7) Isolate or sandbox the affected application environment to limit lateral movement if exploitation occurs. 8) Regularly review and update security controls related to file handling and input validation. These measures will reduce the risk of exploitation while awaiting an official fix from the vendor.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-03-19T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d9bb7ef31ef0b589451

Added to database: 2/25/2026, 9:46:03 PM

Last enriched: 2/26/2026, 11:31:49 AM

Last updated: 4/12/2026, 2:35:36 PM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses