Plataforma
nodejs
Componente
trudesk
Corrigido em
v1.2.0
CVE-2022-1290 describes a stored Cross-Site Scripting (XSS) vulnerability discovered in the Trudesk application, a Node.js project hosted on GitHub. This vulnerability allows attackers to inject malicious scripts into the application, potentially compromising user accounts and sensitive data. The vulnerability affects versions of Trudesk prior to v1.2.0, and a patch has been released to address the issue.
The impact of this XSS vulnerability is significant. An attacker can inject arbitrary JavaScript code into the Trudesk application, which will then be executed in the context of any user who views the affected page. This can lead to a variety of malicious actions, including session hijacking, where the attacker gains control of a user's account. Sensitive data, such as user credentials or personal information, could be stolen. Furthermore, the attacker could deface the application or redirect users to malicious websites. The ease of exploitation, combined with the potential for widespread impact, makes this a high-priority vulnerability.
CVE-2022-1290 was publicly disclosed on April 10, 2022. While no active exploitation campaigns have been definitively linked to this specific vulnerability, the ease of exploitation and the potential impact make it a likely target for opportunistic attackers. No public proof-of-concept exploits have been widely disseminated, but the vulnerability's nature makes it relatively straightforward to exploit. It is not currently listed on the CISA KEV catalog.
Organizations using Trudesk in production environments, particularly those with publicly accessible instances, are at risk. Shared hosting environments where multiple users share the same server instance are also particularly vulnerable, as an attacker could potentially compromise other users through this vulnerability.
• nodejs / server:
find /var/www/trudesk -type f -name '*.js' -print0 | xargs -0 grep -i 'document.location' || grep -i 'eval(' || grep -i 'new Function('• generic web:
curl -I <trudesk_url>/<affected_page>Inspect the response headers for unusual content or unexpected scripting tags. • generic web:
curl <trudesk_url>/<affected_page>?Name=<script>alert(1)</script>Observe the browser's JavaScript console for any errors or unexpected behavior.
disclosure
patch
Status do Exploit
EPSS
0.36% (percentil 58%)
Vetor CVSS
The primary mitigation for CVE-2022-1290 is to immediately upgrade Trudesk to version 1.2.0 or later. This version contains a fix that prevents the injection of malicious scripts. If upgrading is not immediately feasible, consider implementing input validation and sanitization on the "Name", "Group Name", and "Title" fields to prevent the injection of potentially harmful characters. Web Application Firewalls (WAFs) configured to detect and block XSS payloads can also provide a temporary layer of protection. After upgrading, confirm the fix by attempting to inject a simple XSS payload (e.g., <script>alert(1)</script>) into the affected fields and verifying that the script is not executed.
Actualice trudesk a la versión 1.2.0 o superior. Esta versión contiene la corrección para la vulnerabilidad XSS almacenada. La actualización se puede realizar a través del panel de administración o descargando la última versión del repositorio y reemplazando los archivos.
Análise de vulnerabilidades e alertas críticos diretamente no seu e-mail.
CVE-2022-1290 is a critical stored Cross-Site Scripting (XSS) vulnerability affecting Trudesk versions prior to v1.2.0, allowing attackers to inject malicious scripts.
You are affected if you are using Trudesk version 1.2.0 or earlier. Immediately check your version and upgrade if necessary.
Upgrade Trudesk to version 1.2.0 or later to resolve the vulnerability. Implement input validation as a temporary workaround if immediate upgrade is not possible.
While no confirmed active exploitation campaigns are publicly known, the vulnerability's ease of exploitation makes it a potential target.
Refer to the Trudesk GitHub repository for updates and advisories: https://github.com/polonel/trudesk
Envie seu arquivo de dependências e descubra na hora se esta e outras CVEs te atingem.