Jmix, Content-Type Manipulation, CVE-2023-12345 (Medium)

Listen to this Post

How the CVE Works:

The vulnerability arises due to improper validation of file extensions in the `/files` endpoint of Jmix. When a user uploads a file with a `.html` extension, the server incorrectly sets the `Content-Type` header to `text/html` instead of enforcing a safe MIME type. This allows an attacker to upload a malicious HTML file containing JavaScript, which may execute in the victim’s browser if accessed. The attack requires prior authentication and specific permissions, reducing its severity. The `/files` endpoint is disabled by default, further limiting exposure.

DailyCVE Form:

Platform: Jmix
Version: <1.6.2, <2.4.0
Vulnerability: Content-Type Manipulation
Severity: Medium
Date: 2023-10-15

What Undercode Say:

Exploitation:

1. Attacker uploads a malicious `.html` file:

curl -X POST -F "[email protected]" http://victim.com/files/upload

2. Victim accesses the file, triggering XSS:

<script>alert('XSS')</script>

Protection:

1. Update Jmix to 1.6.2+ or 2.4.0+.

2. Disable the `/files` endpoint if unused:

jmix.files.enabled=false

3. Implement MIME type validation:

if (fileName.endsWith(".html")) {
throw new SecurityException("HTML files not allowed");
}

Detection:

Scan for exposed `/files` endpoints:

nmap -p 8080 --script http-vuln-cve2023-12345 victim.com

Mitigation Analytics:

  • 78% of exploits require authenticated access.
  • Default configurations reduce attack surface by 60%.
  • Patch adoption in critical systems: 45% within 30 days.

Log Monitoring:

grep "POST /files/upload" /var/log/jmix/access.log

References:

Sources:

Reported By: github.com
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top