Security Advisory - IXSA-20241204-01

Advisory ID IXSA-20241204-01
Version 1.1
Last updated 17.12.2024
Published 04.12.2024
Status Resolved
CVEs CVE-2024-55554
Summary User-defined porlets on portal pages are susceptible to the execution of Java Script code in HTML („Cross-Site-Scripting“).
Type/Severity High
Description On Intrexx portal pages, portlets of the type “User-defined” can be created with user-defined HTML input. Java script code inserted in this portlet can be executed unnoticed in the portal when the portlet is output in the same or another user context and can lead to a cross-site scripting vulnerability. With Intrexx version 12.0.2, this vulnerability will be closed. With this release, three configuration options are available in the portal properties to influence the behavior of the output of the user-defined portlet and thus secure it.
Solution Please install Intrexx version 12.0.2 and check the new configuration options in the portal properties under “Security” immediately after completing the update.
Affected Products
  • Intrexx Portal Server <= 12.0.1
Fixes
  • Intrexx Version 12.0.2 (12.0.2.20241204.1), Released on 04.12.2024
References
Credits Found by: Marcel Heisel (HiSolutions AG)