Skip to content

Session Hijacking via XSS attack in header and session grid

High
dasgarner published GHSA-xchw-pf2w-rpgq Apr 11, 2024

Package

composer Xibo CMS (Composer)

Affected versions

>=1.8.0, <=4.0.8

Patched versions

>=3.3.10, >=4.0.9

Description

Impact

Some request headers are not correctly sanitised when stored in the session and display tables.

These headers can be used to inject a malicious script into the session page to exfiltrate session IDs and User Agents. These session IDs / User Agents can subsequently be used to hijack active sessions.

A malicious script can be injected into the display grid to exfiltrate information related to displays.

Patches

Users should upgrade to version 3.3.10 or 4.0.9 which fix this issue. Customers who host their CMS with Xibo Signage have already received an upgrade or patch to resolve this issue regardless of the CMS version that they are running.

Workarounds

Upgrading to a fixed version is necessary to remediate.

Patches are available for earlier versions of Xibo CMS that are out of security support:

References

Xibo Signage Security Advisory

Credit

Thanks to @Saadet-T (Saadet Elif Tokuoğlu) who discovered this issue.

Severity

High
8.8
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE ID

CVE-2024-29022

Credits