Skip to content

Security Advisories

We take security seriously at DFIR-IRIS. We are committed to providing a secure and reliable platform for our users. If you believe you have found a security vulnerability in any of our projects, please report it to us by sending an email to contact@dfir-iris.org. We will investigate all legitimate reports and do our best to quickly fix the problem.

This page lists all security advisories that have been published for the code released by DFIR-IRIS.

CVE-2024-34060 Feb 18, 2024

CVE ID Github ID Severity Impacted product
CVE-2024-34060 GHSA-9rw6-5q9j-82fm High - CVSS3 4.6/10 iris-evtx-module

Description

The iris-evtx-module is a pipeline plugin of iris-web that processes EVTX files through IRIS web application. During the upload of an EVTX through this pipeline, the filename is not safely handled and may cause an Arbitrary File Write. This can lead to a remote code execution (RCE) when combined with a Server Side Template Injection (SSTI).

This module is not enabled by default.

Affected versions

  • iris-evtx-module < 1.0.0

Fixed versions

  • iris-evtx-module >= 1.0.0

Workarounds

Disable the module in IRIS Advanced settings. The module is not enabled by default.

Acknowledgment

Thanks to Dan Shallom (OP Innovate) for the responsible disclosure.

CVE-2024-25640 Feb 18, 2024

CVE ID Github ID Severity Impacted product
CVE-2024-25640 GHSA-2xq6-qc74-w5vp Moderate - CVSS3 4.6/10 iris-web

Description

A stored Cross-Site Scripting (XSS) vulnerability has been identified in iris-web, affecting multiple locations, notably descriptions inputs, in versions prior to v2.4.0. The vulnerability may allow an attacker to inject malicious scripts into the application, which could then be executed when a user visits the affected locations. This could lead to unauthorized access, data theft, or other related malicious activities.

An attacker need to be authenticated on the application to exploit this vulnerability.

Affected versions

  • iris-web < 2.4.0

Fixed versions

  • iris-web >= 2.4.0

Workarounds

No workarounds are available. It is recommended to upgrade to the latest version of iris-web.

Acknowledgment

Thanks to Yehonatan Harizi (OP-C) for the responsible disclosure.

CVE-2024-25624 Feb 15, 2024

CVE ID Github ID Severity Impacted product
CVE-2024-25624 GHSA-m64w-f7fg-hpcr High - CVSS3 7.2/10 iris-web

Description

Due to an improper setup of Jinja2 environment, reports generation in iris-web is prone to a Server Side Template Injection (SSTI). Successful exploitation of the vulnerability can lead to an arbitrary Remote Code Execution.

An authenticated administrator has to upload a crafted report template containing the payload. Upon generation of a report based on the weaponised template, any user can trigger the vulnerability.

Affected versions

  • iris-web < 2.4.6

Fixed versions

  • iris-web >= 2.4.6

Workarounds

No workaround is available. It is recommended to update as soon as possible. Until patching, review the report templates and keep the administrative privileges that include the upload of report templates limited to dedicated users.

Acknowledgment

Thanks to Dan Shallom (OP Innovate) for the responsible disclosure.

CVE-2023-50712 Dec 18, 2023

CVE ID Github ID Severity Impacted product
CVE-2023-30615 GHSA-593r-747g-p92p Moderate - CVSS3 4.6/10 iris-web

Description

A stored Cross-Site Scripting (XSS) vulnerability has been identified in iris-web, affecting multiple locations in versions prior to v2.3.7. The vulnerability may allow an attacker to inject malicious scripts into the application, which could then be executed when a user visits the affected locations. This could lead to unauthorized access, data theft, or other related malicious activities.

An attacker need to be authenticated on the application to exploit this vulnerability.

Affected versions

  • iris-web < 2.3.7

Fixed versions

  • iris-web >= 2.3.7

Workarounds

No workaround is available.

Acknowledgment

Thanks to Leonard Rapp (G DATA Advanced Analytics GmbH) for the responsible disclosure.

CVE-2023-30615 May 24, 2023

CVE ID Github ID Severity Impacted product
CVE-2023-30615 GHSA-gc6j-6276-2m49 Moderate - CVSS3 4.6/10 iris-web

Description

A stored Cross-Site Scripting (XSS) vulnerability has been identified in iris-web, affecting multiple locations in versions prior to v2.2.1. The vulnerability allows an attacker to inject malicious scripts into the application, which are then executed when a user visits the affected locations. This can lead to unauthorized access, data theft, or other related malicious activities.

An attacker need to be authenticated on the application to exploit this vulnerability.

Affected versions

  • iris-web < 2.2.1
  • iris-web > 2.0.0 and < 2.2.1 while not using the alerting feature are not impacted.

Fixed versions

  • iris-web >= 2.2.1

Workarounds

No workaround is available.


Last update: 2023-12-30