Miggo Logo

CVE-2023-49289:
Ajax Pro Cross-site Scripting

6.3

CVSS Score
3.1

Basic Information

EPSS Score
0.56654%
Published
12/5/2023
Updated
12/5/2023
KEV Status
No
Technology
TechnologyC#

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
Package NameEcosystemVulnerable VersionsFirst Patched Version
AjaxNetProfessionalnuget< 21.12.22.121.12.22.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from unsafe JSON deserialization in core.js's parse() function. The commit fix shows: 1) Removal of ISO date handling that could be manipulated 2) Narrowing the regex from .*? (greedy match) to \d+ (strict numeric match) for Date() parameters 3) Removal of complex date parsing logic that could bypass sanitization. These changes directly address XSS by preventing injection of malicious objects through date fields. The eval() call with insufficient input validation made this function particularly dangerous for untrusted data deserialization.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Ov*rvi*w *****t** v*rsions o* t*is p**k*** *r* vuln*r**l* to **s*ri*liz*tion o* Untrust** **t* *u* to t** possi*ility o* **s*ri*liz*tion o* *r*itr*ry J*v*S*ript o*j**ts. ### **s*ription *ross-Sit* S*riptin* (XSS) *tt**ks *r* * typ* o* inj**tio

Reasoning

T** vuln*r**ility st*ms *rom uns*** JSON **s*ri*liz*tion in `*or*.js`'s `p*rs*()` *un*tion. T** *ommit *ix s*ows: *) R*mov*l o* ISO **t* **n*lin* t**t *oul* ** m*nipul*t** *) N*rrowin* t** r***x *rom .*? (*r***y m*t**) to \*+ (stri*t num*ri* m*t**) *