CVE-2024-50658
Published: 07 January 2025
Summary
CVE-2024-50658 is a critical-severity Code Injection (CWE-94) vulnerability in Ipublishmedia Adportal. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 14.2% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SC-7 (Boundary Protection) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Flaw remediation directly addresses the SSTI vulnerability in AdPortal 3.0.39 by identifying, reporting, and patching the specific code flaw in updateuserinfo.html.
Information input validation enforces sanitization and validation of untrusted inputs like shippingAsBilling and firstname parameters to block SSTI payloads before template processing.
Boundary protection implements web application firewalls or proxies to inspect and filter network traffic for SSTI attack patterns targeting the vulnerable endpoint.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SSTI in public-facing web app directly enables remote exploitation for arbitrary code execution (T1190) and subsequent use of command/script interpreters (T1059).
NVD Description
Server-Side Template Injection (SSTI) was found in AdPortal 3.0.39 allows a remote attacker to execute arbitrary code via the shippingAsBilling and firstname parameters in updateuserinfo.html file
Deeper analysisAI
CVE-2024-50658 is a Server-Side Template Injection (SSTI) vulnerability, classified under CWE-94, affecting AdPortal version 3.0.39. The issue resides in the updateuserinfo.html file, where the shippingAsBilling and firstname parameters can be manipulated to enable arbitrary code execution. It received a CVSS v3.1 base score of 9.8, reflecting its critical severity due to network accessibility, low attack complexity, and no requirements for privileges or user interaction.
A remote attacker requires no authentication to exploit this vulnerability over the network. Successful exploitation grants the attacker the ability to execute arbitrary code on the server, potentially leading to full compromise with high impacts on confidentiality, integrity, and availability as per the CVSS vector (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Advisories and further details are referenced at http://adportal.com, http://ipublish.com, and https://petercipolone.info/wp-content/uploads/2025/01/iPublishMedia_AdPortal3.0.39_CVEs.pdf, published on 2025-01-07.
Details
- CWE(s)