Plataforma
php
Componente
zero-day
Corrigido em
1.0.1
CVE-2024-11676 is a cross-site scripting (XSS) vulnerability identified in CodeAstro Hospital Management System versions 1.0. This vulnerability allows attackers to inject malicious scripts into the application, potentially leading to session hijacking or defacement. The affected component is the 'Add Laboratory Equipment Page' accessible via /backend/admin/hisadminaddlabequipment.php. A patch is available in version 1.0.1.
Successful exploitation of CVE-2024-11676 allows an attacker to inject arbitrary JavaScript code into the web pages viewed by other users. This can be leveraged to steal session cookies, redirect users to malicious websites, or modify the content of the page. Given the context of a hospital management system, this could potentially compromise sensitive patient data or disrupt critical operations. The vulnerability's remote accessibility significantly broadens the attack surface, as it doesn't require local access to the system.
This vulnerability has been publicly disclosed, increasing the risk of exploitation. While the CVSS score is LOW, the potential impact on a hospital management system warrants immediate attention. No known active campaigns or KEV listing at the time of writing. Public proof-of-concept code is likely to emerge given the disclosure.
Hospitals and healthcare providers using CodeAstro Hospital Management System version 1.0 are at direct risk. Organizations relying on this system for managing patient data and laboratory equipment are particularly vulnerable. Shared hosting environments where multiple users share the same server instance could also be affected, as an attacker could potentially compromise other users’ accounts.
• generic web: Use curl to test the /backend/admin/hisadminaddlabequipment.php endpoint with various payloads containing <script>alert(1)</script> to check for reflected XSS.
curl -X POST -d "eqp_code=<script>alert(1)</script>" http://[target]/backend/admin/his_admin_add_lab_equipment.php• generic web: Examine access and error logs for suspicious requests containing JavaScript code or unusual characters in the eqpcode, eqpname, eqpvendor, eqpdesc, eqpdept, eqpstatus, or eqp_qty parameters.
• php: Review the source code of /backend/admin/hisadminaddlabequipment.php for missing or inadequate input sanitization and output encoding functions.
disclosure
Status do Exploit
EPSS
0.13% (percentil 33%)
CISA SSVC
Vetor CVSS
The primary mitigation for CVE-2024-11676 is to upgrade to CodeAstro Hospital Management System version 1.0.1 or later, which includes the necessary fix. If upgrading immediately is not feasible, consider implementing strict input validation and output encoding on the /backend/admin/hisadminaddlabequipment.php page to sanitize user-supplied data. Web application firewalls (WAFs) configured to detect and block XSS payloads can also provide a temporary layer of protection. Regularly review and update input validation routines to prevent similar vulnerabilities.
Actualice el sistema de gestión hospitalaria a una versión parcheada que solucione la vulnerabilidad XSS. Si no hay una versión disponible, revise y filtre las entradas de los campos eqp_code, eqp_name, eqp_vendor, eqp_desc, eqp_dept, eqp_status y eqp_qty en el archivo his_admin_add_lab_equipment.php para evitar la inyección de código malicioso.
Análise de vulnerabilidades e alertas críticos diretamente no seu e-mail.
CVE-2024-11676 is a cross-site scripting (XSS) vulnerability affecting CodeAstro Hospital Management System versions 1.0, allowing attackers to inject malicious scripts via the /backend/admin/hisadminaddlabequipment.php page.
Yes, if you are using CodeAstro Hospital Management System version 1.0, you are vulnerable to this XSS attack. Upgrade to version 1.0.1 to mitigate the risk.
The recommended fix is to upgrade to CodeAstro Hospital Management System version 1.0.1 or later. Implement input validation and output encoding as a temporary workaround if immediate upgrade is not possible.
While no active campaigns are confirmed, the vulnerability has been publicly disclosed, increasing the likelihood of exploitation. Monitor your systems closely.
Refer to the CodeAstro website or their official security advisory channels for the latest information and updates regarding CVE-2024-11676.
Envie seu arquivo de dependências e descubra na hora se esta e outras CVEs te atingem.