NETSCOUT nGeniusONE, Stored XSS, CVE-2025-32984 (Critical)

Listen to this Post

How CVE-2025-32984 Works

This vulnerability in NETSCOUT nGeniusONE (before v6.4.0 b2350) allows attackers to inject malicious scripts via a POST parameter. The payload persists in the web interface, executing when an admin views the compromised component. The lack of input sanitization enables stored XSS, potentially leading to session hijacking, privilege escalation, or malware delivery.

DailyCVE Form

Platform: NETSCOUT nGeniusONE
Version: <6.4.0 b2350
Vulnerability: Stored XSS
Severity: Critical
Date: 05/27/2025

Prediction: Patch by 07/15/2025

What Undercode Say:

Exploit:

POST /api/endpoint HTTP/1.1
Host: target
Content-Type: application/x-www-form-urlencoded
Payload: param=<script>alert(document.cookie)</script>

Detection:

grep -r "unsafe_html" /var/www/ngeniusone
curl -X POST -d "param=test<xss>" http://target/api --output xss_test.html

Mitigation:

1. Patch to v6.4.0 b2350+.

2. WAF rules to block XSS patterns:

location /api {
modsecurity_rules 'SecRule ARGS "@detectXSS" deny";
}

3. Manual sanitization:

import html
def sanitize_input(data):
return html.escape(data)

Log Analysis:

SELECT FROM ngenius_logs WHERE request LIKE "%<script>%";

Temporary Fix:

RewriteCond %{QUERY_STRING} (<|%3C).script.(>|%3E) [bash]
RewriteRule ^ - [bash]

Verification:

nikto -h target -Tuning xss

Backup:

tar -czvf ngeniusone_backup.tar.gz /opt/ngeniusone

References:

  • MITRE CVE-2025-32984
  • NETSCOUT Security Bulletin 2025-0425

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top