Listen to this Post
How CVE-2025-32984 Works
This vulnerability in NETSCOUT nGeniusONE (before v6.4.0 b2350) allows attackers to inject malicious scripts via a POST parameter. The payload persists in the web interface, executing when an admin views the compromised component. The lack of input sanitization enables stored XSS, potentially leading to session hijacking, privilege escalation, or malware delivery.
DailyCVE Form
Platform: NETSCOUT nGeniusONE
Version: <6.4.0 b2350
Vulnerability: Stored XSS
Severity: Critical
Date: 05/27/2025
Prediction: Patch by 07/15/2025
What Undercode Say:
Exploit:
POST /api/endpoint HTTP/1.1 Host: target Content-Type: application/x-www-form-urlencoded Payload: param=<script>alert(document.cookie)</script>
Detection:
grep -r "unsafe_html" /var/www/ngeniusone curl -X POST -d "param=test<xss>" http://target/api --output xss_test.html
Mitigation:
1. Patch to v6.4.0 b2350+.
2. WAF rules to block XSS patterns:
location /api { modsecurity_rules 'SecRule ARGS "@detectXSS" deny"; }
3. Manual sanitization:
import html def sanitize_input(data): return html.escape(data)
Log Analysis:
SELECT FROM ngenius_logs WHERE request LIKE "%<script>%";
Temporary Fix:
RewriteCond %{QUERY_STRING} (<|%3C).script.(>|%3E) [bash] RewriteRule ^ - [bash]
Verification:
nikto -h target -Tuning xss
Backup:
tar -czvf ngeniusone_backup.tar.gz /opt/ngeniusone
References:
- MITRE CVE-2025-32984
- NETSCOUT Security Bulletin 2025-0425
Sources:
Reported By: nvd.nist.gov
Extra Source Hub:
Undercode