Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-36498: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Image Access GmbH Scan2Net

0
Medium
VulnerabilityCVE-2024-36498cvecve-2024-36498cwe-79
Published: Thu Dec 12 2024 (12/12/2024, 12:46:43 UTC)
Source: CVE Database V5
Vendor/Project: Image Access GmbH
Product: Scan2Net

Description

Due to missing input sanitization, an attacker can perform cross-site-scripting attacks and run arbitrary Javascript in the browser of other users. The "Edit Disclaimer Text" function of the configuration menu is vulnerable to stored XSS. Only the users Poweruser and Admin can use this function which is available at the URL https://$SCANNER/cgi/admin.cgi?-rdisclaimer+-apre The stored Javascript payload will be executed every time the ScanWizard is loaded, even in the Kiosk-mode browser. Version 7.40 implemented a fix, but it could be bypassed via URL-encoding the Javascript payload again.

AI-Powered Analysis

AILast updated: 11/04/2025, 00:04:00 UTC

Technical Analysis

CVE-2024-36498 is a stored cross-site scripting (XSS) vulnerability classified under CWE-79, found in Image Access GmbH's Scan2Net product, version 7.40. The vulnerability exists due to improper neutralization of input during web page generation, specifically in the 'Edit Disclaimer Text' feature within the configuration menu. This function is accessible only to users with Poweruser or Admin privileges via a specific URL endpoint. An attacker with access to these roles can inject arbitrary JavaScript code into the disclaimer text, which is then stored and executed every time the ScanWizard interface loads, including in the Kiosk-mode browser environment. This persistent XSS allows the attacker to run malicious scripts in the context of other users' browsers, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of the victim. Although a fix was implemented in version 7.40, it was found to be insufficient as the payload can bypass sanitization by double URL-encoding the JavaScript code. The vulnerability has a CVSS 3.1 base score of 4.7, indicating medium severity, with an attack vector over the network, low attack complexity, no privileges required, but requiring user interaction. No known exploits have been reported in the wild as of the publication date. The vulnerability affects the confidentiality and integrity of user sessions but does not impact availability. The scope is limited to users who load the ScanWizard interface after the malicious payload has been injected.

Potential Impact

For European organizations using Image Access GmbH Scan2Net scanners, this vulnerability poses a risk of session hijacking, unauthorized actions, and potential compromise of user credentials or sensitive information within the scanner's web interface. Since the vulnerability affects the administrative configuration interface, attackers who gain or already have Poweruser or Admin access can implant persistent malicious scripts that execute for other users, potentially leading to lateral movement or further compromise within the network. The impact is particularly relevant for organizations relying on Scan2Net devices for document scanning workflows, including government agencies, financial institutions, and enterprises with strict data handling requirements. Exploitation could undermine trust in document processing integrity and expose internal users to phishing or malware delivery via the scanner interface. Although the vulnerability does not directly affect system availability, the integrity and confidentiality risks could lead to compliance violations under GDPR if personal data is exposed or manipulated. The medium severity score reflects the need for timely remediation to prevent exploitation, especially in environments where multiple users access the scanner interface.

Mitigation Recommendations

European organizations should immediately verify the Scan2Net product version in use and upgrade to a version where the vulnerability is fully patched beyond the partial fix in 7.40. If an updated version is not yet available, restrict access to the 'Edit Disclaimer Text' function strictly to trusted administrators and monitor for suspicious activity. Implement network segmentation and access controls to limit exposure of the scanner's web interface to only authorized personnel. Employ web application firewalls (WAFs) with custom rules to detect and block attempts to inject or execute encoded JavaScript payloads targeting the vulnerable endpoint. Conduct regular security audits and penetration tests focusing on the scanner's web interface to identify any residual injection vectors. Educate administrators about the risks of stored XSS and the importance of sanitizing input fields, even in administrative functions. Additionally, monitor logs for unusual access patterns or repeated attempts to exploit the vulnerability. Finally, consider disabling the 'Edit Disclaimer Text' feature if it is not essential to operations until a secure patch is applied.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
SEC-VLab
Date Reserved
2024-05-29T06:48:49.689Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69092626fe7723195e0b5ac0

Added to database: 11/3/2025, 10:01:10 PM

Last enriched: 11/4/2025, 12:04:00 AM

Last updated: 11/5/2025, 2:10:30 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats