CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-0696

High Severity
Atrocore
SVRS
58/100

CVSSv3
6.1/10

EPSS
0.0007/1

CVE-2024-0696 is a cross-site scripting (XSS) vulnerability in AtroCore AtroPIM 1.8.4, specifically affecting the Product Series Overview component. This vulnerability allows remote attackers to inject arbitrary web scripts or HTML via the /#ProductSerie/view/ file path. Despite a CVSS score of 6.1, SOCRadar's Vulnerability Risk Score (SVRS) is 58, indicating a moderate risk level for exploitation. Public disclosure of the exploit increases the potential for malicious use. Organizations using AtroPIM should be aware of the risk of unauthorized script execution within user browsers. This can lead to data theft, session hijacking, or defacement of the web application. While not critical based on the SVRS threshold of 80, remediation is still recommended to minimize the attack surface. Due to the vendor's lack of response, users are advised to implement their own mitigation strategies.

No tags available
CVSS:3.1
AV:N
AC:L
PR:N
UI:R
S:C
C:L
I:L
A:N
2024-01-18

2024-05-17
Eye Icon
SOCRadar
AI Insight

Description:

CVE-2024-0696 is a problematic vulnerability found in AtroCore AtroPIM 1.8.4, affecting the Product Series Overview component. It allows for cross-site scripting (XSS) attacks, enabling remote exploitation. The vulnerability has been disclosed publicly and may be actively exploited. The SVRS score of 49 indicates a moderate risk, requiring attention and appropriate mitigation measures.

Key Insights:

  1. Cross-Site Scripting (XSS) Vulnerability: This vulnerability allows attackers to inject malicious scripts into the affected web application, potentially leading to account compromise, sensitive data theft, or website defacement.

  2. Remote Exploitability: The vulnerability can be exploited remotely, making it accessible to attackers without requiring physical access to the affected system. This increases the risk of widespread exploitation.

  3. Public Disclosure: The vulnerability has been publicly disclosed, increasing the likelihood of exploitation by malicious actors. It is crucial to take immediate action to mitigate the risk.

Mitigation Strategies:

  1. Update Software: Apply the latest software updates and patches provided by the vendor to address the vulnerability. Ensure that all affected systems are updated promptly.

  2. Implement XSS Protection: Implement robust XSS protection mechanisms, such as input validation and encoding, to prevent malicious scripts from being executed.

  3. Monitor and Review Logs: Regularly monitor system logs and security alerts for suspicious activities or signs of compromise. Review logs promptly to detect and respond to potential attacks.

  4. Educate Users: Educate users about the risks of XSS attacks and encourage them to be cautious when interacting with untrusted websites or links.

Additional Information:

  • Threat Actors/APT Groups: No specific threat actors or APT groups have been identified as actively exploiting this vulnerability.

  • Exploit Status: Active exploits have been published, indicating that attackers may have the technical capability to exploit the vulnerability.

  • CISA Warnings: The Cybersecurity and Infrastructure Security Agency (CISA) has not issued a warning for this vulnerability.

  • In the Wild: There is no information available to confirm whether the vulnerability is actively exploited in the wild.

If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

No news found for this CVE

Social Media

No tweets found for this CVE

Affected Software

Configuration 1
TypeVendorProduct
AppAtrocoreatropim

References

ReferenceLink
[email protected]https://pasteboard.co/wsTTLjp5UEPq.png
[email protected]https://vuldb.com/?ctiid.251481
[email protected]https://vuldb.com/?id.251481

CWE Details

CWE IDCWE NameDescription
CWE-79Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence