CVE-2024-29023
Session Hijacking via token exposure on the session page in Xibo CMS
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Xibo is an Open Source Digital Signage platform with a web content management system and Windows display player software. Session tokens are exposed in the return of session search API call on the sessions page. Subsequently they can be exfiltrated and used to hijack a session. Users must be granted access to the session page, or be a super admin. Users should upgrade to version 3.3.10 or 4.0.9 which fix this issue. Customers who host their CMS with the Xibo Signage service have already received an upgrade or patch to resolve this issue regardless of the CMS version that they are running. Patches are available for earlier versions of Xibo CMS that are out of security support: 2.3 patch ebeccd000b51f00b9a25f56a2f252d6812ebf850.diff. 1.8 patch a81044e6ccdd92cc967e34c125bd8162432e51bc.diff. There are no known workarounds for this vulnerability.
Xibo es una plataforma de señalización digital de código abierto con un sistema de gestión de contenidos web y software de reproducción de pantalla de Windows. Los tokens de sesión se exponen en el retorno de la llamada API de búsqueda de sesión en la página de sesiones. Posteriormente pueden ser extraídos y utilizados para secuestrar una sesión. Los usuarios deben tener acceso a la página de sesión o ser superadministradores. Los usuarios deben actualizar a la versión 3.3.10 o 4.0.9, que soluciona este problema. Los clientes que alojan su CMS con el servicio Xibo Signage ya recibieron una actualización o parche para resolver este problema independientemente de la versión de CMS que estén ejecutando. Hay parches disponibles para versiones anteriores de Xibo CMS que no cuentan con soporte de seguridad: parche 2.3 ebeccd000b51f00b9a25f56a2f252d6812ebf850.diff. Parche 1.8 a81044e6ccdd92cc967e34c125bd8162432e51bc.diff. No se conocen workarounds para esta vulnerabilidad.
CVSS Scores
SSVC
- Decision:Track*
Timeline
- 2024-03-14 CVE Reserved
- 2024-04-12 CVE Published
- 2024-04-13 EPSS Updated
- 2024-08-02 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
References (6)
URL | Tag | Source |
---|---|---|
https://github.com/dasgarner/xibo-cms/commit/a81044e6ccdd92cc967e34c125bd8162432e51bc.diff | X_refsource_misc | |
https://github.com/xibosignage/xibo-cms/commit/3b93636aa7aea07d1f7dfa36b63b773ac16d7cde | X_refsource_misc | |
https://github.com/xibosignage/xibo-cms/commit/49f018fd9fe64fcd417d7c2ef96078bd7b2b88b7 | X_refsource_misc | |
https://github.com/xibosignage/xibo-cms/commit/ebeccd000b51f00b9a25f56a2f252d6812ebf850.diff | X_refsource_misc | |
https://github.com/xibosignage/xibo-cms/security/advisories/GHSA-xmc6-cfq5-hg39 | X_refsource_confirm | |
https://xibosignage.com/blog/security-advisory-2024-04 | X_refsource_misc |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Xibosignage Search vendor "Xibosignage" | Xibo-cms Search vendor "Xibosignage" for product "Xibo-cms" | >= 1.8.0 < 3.3.10 Search vendor "Xibosignage" for product "Xibo-cms" and version " >= 1.8.0 < 3.3.10" | en |
Affected
| ||||||
Xibosignage Search vendor "Xibosignage" | Xibo-cms Search vendor "Xibosignage" for product "Xibo-cms" | >= 4.0.0 < 4.0.9 Search vendor "Xibosignage" for product "Xibo-cms" and version " >= 4.0.0 < 4.0.9" | en |
Affected
|