CVE-2024-50861: n/a
The ip_mod_dns_key_form.cgi request in GestioIP v3.5.7 is vulnerable to Stored XSS. An attacker can inject malicious code into the "TSIG Key" field, which is saved in the database and triggers XSS when viewed, enabling data exfiltration and CSRF attacks.
AI Analysis
Technical Summary
CVE-2024-50861 identifies a stored cross-site scripting (XSS) vulnerability in GestioIP version 3.5.7, specifically within the ip_mod_dns_key_form.cgi request handler. The vulnerability arises because the application fails to properly sanitize or encode user input submitted to the "TSIG Key" field. This field's content is stored persistently in the backend database and rendered in the user interface without adequate output encoding, allowing malicious JavaScript payloads to execute in the context of authenticated users who view the affected page. The attack vector is remote and does not require authentication (AV:N, PR:N), but user interaction is necessary to trigger the payload (UI:R). The vulnerability impacts confidentiality and integrity by enabling data exfiltration and CSRF attacks, as attackers can steal session tokens or perform unauthorized actions on behalf of users. The scope is changed (S:C) because the vulnerability affects data beyond the attacker’s privileges, potentially impacting other users. The CVSS 3.1 base score is 6.1, reflecting medium severity. There are no known public exploits or patches available at the time of publication, increasing the urgency for organizations to implement mitigations. The vulnerability is classified under CWE-79, a common and well-understood web application security issue.
Potential Impact
The primary impact of CVE-2024-50861 is the compromise of user confidentiality and integrity within GestioIP environments. Successful exploitation allows attackers to execute arbitrary JavaScript in the context of other users’ browsers, potentially leading to theft of sensitive information such as authentication tokens, personal data, or administrative credentials. Additionally, attackers can perform CSRF attacks, causing users to unknowingly execute unauthorized commands or configuration changes within the GestioIP application. This can disrupt network management operations or expose network infrastructure details. Since GestioIP is used for IP address management and DNS infrastructure, exploitation could indirectly affect network stability and security posture. The vulnerability does not directly impact availability but can facilitate further attacks that degrade service or compromise network integrity. Organizations relying on GestioIP 3.5.7 without mitigation are at risk of targeted attacks, especially in environments where multiple users access the management interface.
Mitigation Recommendations
To mitigate CVE-2024-50861, organizations should first check for official patches or updates from GestioIP and apply them promptly once available. In the absence of patches, implement strict input validation and output encoding on the "TSIG Key" field to neutralize malicious scripts. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the application context. Limit user permissions to reduce the impact of potential XSS exploitation, ensuring that only trusted users can modify sensitive fields. Regularly audit and sanitize existing database entries for injected scripts. Additionally, educate users to avoid clicking suspicious links or viewing untrusted content within the GestioIP interface. Deploy web application firewalls (WAFs) with rules targeting XSS payloads to provide an additional layer of defense. Monitor application logs for unusual activities indicative of exploitation attempts. Finally, consider isolating the GestioIP management interface within a secure network segment to reduce exposure.
Affected Countries
United States, Germany, United Kingdom, France, Canada, Australia, Netherlands, Japan, South Korea, India
CVE-2024-50861: n/a
Description
The ip_mod_dns_key_form.cgi request in GestioIP v3.5.7 is vulnerable to Stored XSS. An attacker can inject malicious code into the "TSIG Key" field, which is saved in the database and triggers XSS when viewed, enabling data exfiltration and CSRF attacks.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-50861 identifies a stored cross-site scripting (XSS) vulnerability in GestioIP version 3.5.7, specifically within the ip_mod_dns_key_form.cgi request handler. The vulnerability arises because the application fails to properly sanitize or encode user input submitted to the "TSIG Key" field. This field's content is stored persistently in the backend database and rendered in the user interface without adequate output encoding, allowing malicious JavaScript payloads to execute in the context of authenticated users who view the affected page. The attack vector is remote and does not require authentication (AV:N, PR:N), but user interaction is necessary to trigger the payload (UI:R). The vulnerability impacts confidentiality and integrity by enabling data exfiltration and CSRF attacks, as attackers can steal session tokens or perform unauthorized actions on behalf of users. The scope is changed (S:C) because the vulnerability affects data beyond the attacker’s privileges, potentially impacting other users. The CVSS 3.1 base score is 6.1, reflecting medium severity. There are no known public exploits or patches available at the time of publication, increasing the urgency for organizations to implement mitigations. The vulnerability is classified under CWE-79, a common and well-understood web application security issue.
Potential Impact
The primary impact of CVE-2024-50861 is the compromise of user confidentiality and integrity within GestioIP environments. Successful exploitation allows attackers to execute arbitrary JavaScript in the context of other users’ browsers, potentially leading to theft of sensitive information such as authentication tokens, personal data, or administrative credentials. Additionally, attackers can perform CSRF attacks, causing users to unknowingly execute unauthorized commands or configuration changes within the GestioIP application. This can disrupt network management operations or expose network infrastructure details. Since GestioIP is used for IP address management and DNS infrastructure, exploitation could indirectly affect network stability and security posture. The vulnerability does not directly impact availability but can facilitate further attacks that degrade service or compromise network integrity. Organizations relying on GestioIP 3.5.7 without mitigation are at risk of targeted attacks, especially in environments where multiple users access the management interface.
Mitigation Recommendations
To mitigate CVE-2024-50861, organizations should first check for official patches or updates from GestioIP and apply them promptly once available. In the absence of patches, implement strict input validation and output encoding on the "TSIG Key" field to neutralize malicious scripts. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the application context. Limit user permissions to reduce the impact of potential XSS exploitation, ensuring that only trusted users can modify sensitive fields. Regularly audit and sanitize existing database entries for injected scripts. Additionally, educate users to avoid clicking suspicious links or viewing untrusted content within the GestioIP interface. Deploy web application firewalls (WAFs) with rules targeting XSS payloads to provide an additional layer of defense. Monitor application logs for unusual activities indicative of exploitation attempts. Finally, consider isolating the GestioIP management interface within a secure network segment to reduce exposure.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-10-28T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6ba2b7ef31ef0b5575eb
Added to database: 2/25/2026, 9:37:38 PM
Last enriched: 2/28/2026, 2:35:38 AM
Last updated: 4/12/2026, 7:52:24 AM
Views: 15
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.