Platform
php
Opgelost in
1.0.1
A problematic cross-site scripting (XSS) vulnerability has been identified in Farmacia version 1.0. This flaw resides within the /pagamento.php file and allows attackers to inject malicious scripts by manipulating the 'total' argument. Successful exploitation could lead to session hijacking or defacement of the application. The vulnerability has been publicly disclosed and a patch is available in version 1.0.1.
The XSS vulnerability in Farmacia allows an attacker to inject arbitrary JavaScript code into the application. This code will then be executed in the context of the user's browser when they visit the affected page. An attacker could leverage this to steal session cookies, redirect users to malicious websites, or deface the application. The impact is amplified if the application handles sensitive user data, as an attacker could potentially gain access to this information. Given the public disclosure, the risk of exploitation is elevated.
This vulnerability has been publicly disclosed, increasing the likelihood of exploitation. No known active campaigns targeting this specific vulnerability have been reported as of the publication date. The vulnerability is not currently listed on the CISA KEV catalog. A public proof-of-concept is likely to emerge given the disclosure.
Websites and applications utilizing Farmacia 1.0 are at risk. Shared hosting environments where multiple applications share the same server are particularly vulnerable, as a successful exploit on one application could potentially compromise others. Users who rely on Farmacia for processing payments or handling sensitive data are also at increased risk.
• generic web:
curl -I 'http://your-farmacia-site.com/pagamento.php?total=<script>alert(1)</script>' | grep -i 'content-type' # Check for Content-Type header indicating script execution• generic web:
curl 'http://your-farmacia-site.com/pagamento.php?total=<script>alert(1)</script>' | grep -o '<[^>]*>' # Look for HTML tags injected into the responsedisclosure
Exploit Status
EPSS
0.14% (34% percentiel)
CISA SSVC
CVSS-vector
The primary mitigation for CVE-2024-11995 is to upgrade Farmacia to version 1.0.1, which contains the necessary fix. If upgrading immediately is not feasible, consider implementing input validation and output encoding on the 'total' parameter in /pagamento.php to sanitize user-supplied data. Web Application Firewalls (WAFs) configured to detect and block XSS payloads can also provide a temporary layer of protection. Review and update any existing WAF rules to specifically target XSS attempts on the /pagamento.php endpoint.
Actualizar a una versión parcheada o implementar medidas de sanitización de entrada en el archivo /pagamento.php para el argumento 'total'. Escapar o validar la entrada del usuario antes de mostrarla en la página para prevenir la ejecución de código malicioso.
Kwetsbaarheidsanalyses en kritieke waarschuwingen direct in uw inbox.
CVE-2024-11995 is a cross-site scripting (XSS) vulnerability in Farmacia version 1.0, affecting the /pagamento.php file. Attackers can inject malicious scripts by manipulating the 'total' argument.
Yes, if you are running Farmacia version 1.0, you are affected by this vulnerability. Upgrade to version 1.0.1 to mitigate the risk.
Upgrade Farmacia to version 1.0.1. As a temporary workaround, implement input validation and output encoding on the 'total' parameter in /pagamento.php.
While no active campaigns have been confirmed, the vulnerability has been publicly disclosed, increasing the likelihood of exploitation.
Refer to the Farmacia project's official website or repository for the advisory related to CVE-2024-11995.
Upload je dependency-bestand en kom direct te weten of deze en andere CVEs jou raken.