CVE-2024-35267: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Microsoft Azure DevOps Server 2022
CVE-2024-35267 is a high-severity cross-site scripting (XSS) vulnerability in Microsoft Azure DevOps Server 2022 (version 20231128. 1). It arises from improper neutralization of input during web page generation, allowing an authenticated attacker with low privileges to execute malicious scripts via user interaction. The vulnerability impacts confidentiality and integrity heavily, with limited availability impact. Exploitation requires user interaction but no elevated privileges beyond low-level authenticated access. No known exploits are reported in the wild yet. European organizations using Azure DevOps Server 2022 should prioritize patching and implement strict input validation and content security policies to mitigate risks. Countries with significant Microsoft enterprise adoption and critical infrastructure relying on DevOps workflows are most at risk.
AI Analysis
Technical Summary
CVE-2024-35267 is a cross-site scripting (XSS) vulnerability classified under CWE-79, affecting Microsoft Azure DevOps Server 2022, specifically version 20231128.1. The vulnerability stems from improper neutralization of user-supplied input during the generation of web pages, which allows an attacker to inject malicious scripts into the application interface. An attacker with low-level privileges and authenticated access can exploit this by crafting malicious input that, when rendered, executes arbitrary JavaScript in the context of other users' browsers. This can lead to theft of authentication tokens, session hijacking, or unauthorized actions performed on behalf of the victim user. The CVSS 3.1 score of 7.6 reflects a high severity, with network attack vector, low attack complexity, and requiring privileges but only low-level ones. User interaction is required, meaning the victim must trigger the malicious payload, typically by viewing a crafted page or input. The scope remains unchanged, indicating the vulnerability affects only the vulnerable component without impacting other components. No public exploits have been reported yet, but the presence of this vulnerability in a widely used enterprise DevOps platform raises concerns for organizations relying on Azure DevOps Server for software development lifecycle management. The vulnerability was reserved in May 2024 and published in July 2024, with Microsoft acknowledged as the assigner. No official patches or mitigation links are provided in the data, indicating organizations must monitor for updates and apply them promptly once available.
Potential Impact
For European organizations, this vulnerability poses significant risks to the confidentiality and integrity of their software development processes. Azure DevOps Server is commonly used to manage source code, build pipelines, and deployment workflows, often containing sensitive intellectual property and credentials. Exploitation could allow attackers to steal session tokens, manipulate code repositories, or inject malicious code into builds, potentially leading to supply chain compromises. The requirement for authenticated access limits exposure to insider threats or compromised accounts, but the low privilege level needed increases the attack surface. The user interaction requirement means social engineering or phishing could be used to trigger the exploit. Given the critical role of DevOps in digital transformation and infrastructure management, disruption or compromise could lead to operational delays, data breaches, and reputational damage. European organizations in sectors such as finance, manufacturing, and government, which heavily rely on Azure DevOps Server, are particularly vulnerable. The lack of known exploits currently reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits rapidly after disclosure.
Mitigation Recommendations
Organizations should immediately audit their Azure DevOps Server 2022 installations to confirm affected versions (specifically 20231128.1). Until an official patch is released, implement strict input validation and sanitization on all user inputs within the DevOps environment to prevent script injection. Employ Content Security Policy (CSP) headers to restrict execution of unauthorized scripts in browsers accessing the server. Limit user privileges rigorously, ensuring users have only the minimum necessary access to reduce the potential impact of compromised accounts. Monitor logs for unusual activities indicative of attempted XSS exploitation, such as unexpected script payloads or anomalous user actions. Educate users about phishing and social engineering risks that could trigger user interaction required for exploitation. Consider isolating the Azure DevOps Server behind additional security layers such as web application firewalls (WAFs) configured to detect and block XSS attempts. Stay alert for Microsoft’s official patches or security advisories and apply updates promptly once available. Finally, review and enhance incident response plans to address potential exploitation scenarios involving this vulnerability.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Italy, Spain
CVE-2024-35267: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Microsoft Azure DevOps Server 2022
Description
CVE-2024-35267 is a high-severity cross-site scripting (XSS) vulnerability in Microsoft Azure DevOps Server 2022 (version 20231128. 1). It arises from improper neutralization of input during web page generation, allowing an authenticated attacker with low privileges to execute malicious scripts via user interaction. The vulnerability impacts confidentiality and integrity heavily, with limited availability impact. Exploitation requires user interaction but no elevated privileges beyond low-level authenticated access. No known exploits are reported in the wild yet. European organizations using Azure DevOps Server 2022 should prioritize patching and implement strict input validation and content security policies to mitigate risks. Countries with significant Microsoft enterprise adoption and critical infrastructure relying on DevOps workflows are most at risk.
AI-Powered Analysis
Technical Analysis
CVE-2024-35267 is a cross-site scripting (XSS) vulnerability classified under CWE-79, affecting Microsoft Azure DevOps Server 2022, specifically version 20231128.1. The vulnerability stems from improper neutralization of user-supplied input during the generation of web pages, which allows an attacker to inject malicious scripts into the application interface. An attacker with low-level privileges and authenticated access can exploit this by crafting malicious input that, when rendered, executes arbitrary JavaScript in the context of other users' browsers. This can lead to theft of authentication tokens, session hijacking, or unauthorized actions performed on behalf of the victim user. The CVSS 3.1 score of 7.6 reflects a high severity, with network attack vector, low attack complexity, and requiring privileges but only low-level ones. User interaction is required, meaning the victim must trigger the malicious payload, typically by viewing a crafted page or input. The scope remains unchanged, indicating the vulnerability affects only the vulnerable component without impacting other components. No public exploits have been reported yet, but the presence of this vulnerability in a widely used enterprise DevOps platform raises concerns for organizations relying on Azure DevOps Server for software development lifecycle management. The vulnerability was reserved in May 2024 and published in July 2024, with Microsoft acknowledged as the assigner. No official patches or mitigation links are provided in the data, indicating organizations must monitor for updates and apply them promptly once available.
Potential Impact
For European organizations, this vulnerability poses significant risks to the confidentiality and integrity of their software development processes. Azure DevOps Server is commonly used to manage source code, build pipelines, and deployment workflows, often containing sensitive intellectual property and credentials. Exploitation could allow attackers to steal session tokens, manipulate code repositories, or inject malicious code into builds, potentially leading to supply chain compromises. The requirement for authenticated access limits exposure to insider threats or compromised accounts, but the low privilege level needed increases the attack surface. The user interaction requirement means social engineering or phishing could be used to trigger the exploit. Given the critical role of DevOps in digital transformation and infrastructure management, disruption or compromise could lead to operational delays, data breaches, and reputational damage. European organizations in sectors such as finance, manufacturing, and government, which heavily rely on Azure DevOps Server, are particularly vulnerable. The lack of known exploits currently reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits rapidly after disclosure.
Mitigation Recommendations
Organizations should immediately audit their Azure DevOps Server 2022 installations to confirm affected versions (specifically 20231128.1). Until an official patch is released, implement strict input validation and sanitization on all user inputs within the DevOps environment to prevent script injection. Employ Content Security Policy (CSP) headers to restrict execution of unauthorized scripts in browsers accessing the server. Limit user privileges rigorously, ensuring users have only the minimum necessary access to reduce the potential impact of compromised accounts. Monitor logs for unusual activities indicative of attempted XSS exploitation, such as unexpected script payloads or anomalous user actions. Educate users about phishing and social engineering risks that could trigger user interaction required for exploitation. Consider isolating the Azure DevOps Server behind additional security layers such as web application firewalls (WAFs) configured to detect and block XSS attempts. Stay alert for Microsoft’s official patches or security advisories and apply updates promptly once available. Finally, review and enhance incident response plans to address potential exploitation scenarios involving this vulnerability.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2024-05-14T20:14:47.413Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981dc4522896dcbdb5df
Added to database: 5/21/2025, 9:08:45 AM
Last enriched: 12/17/2025, 12:36:22 AM
Last updated: 1/19/2026, 10:11:03 AM
Views: 47
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1148: Cross-Site Request Forgery in SourceCodester Patients Waiting Area Queue Management System
MediumCVE-2026-1147: Cross Site Scripting in SourceCodester Patients Waiting Area Queue Management System
MediumCVE-2026-1146: Cross Site Scripting in SourceCodester Patients Waiting Area Queue Management System
MediumCVE-2025-59355: CWE-532 Insertion of Sensitive Information into Log File in Apache Software Foundation Apache Linkis
UnknownCVE-2025-29847: CWE-20 Improper Input Validation in Apache Software Foundation Apache Linkis
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.