<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Sicuro24 SicuroWeb — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/sicuro24-sicuroweb/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/sicuro24-sicuroweb/feed.xml" rel="self" type="application/rss+xml"/><item><title>Beghelli Sicuro24 SicuroWeb AngularJS Sandbox Escape via Template Injection</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-beghelli-sicuro24-angularjs/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-beghelli-sicuro24-angularjs/</guid><description>Beghelli Sicuro24 SicuroWeb is vulnerable to arbitrary JavaScript execution due to embedding an end-of-life AngularJS 1.5.2 component with known sandbox escape primitives combined with template injection, enabling attackers to compromise operator browser sessions via MITM attacks.</description><content:encoded><![CDATA[<p>Beghelli Sicuro24 SicuroWeb is vulnerable due to its inclusion of AngularJS version 1.5.2, which is an end-of-life component with known sandbox escape primitives. This vulnerability, tracked as CVE-2026-41468, can be exploited via template injection present within the SicuroWeb application. When combined, these vulnerabilities allow a network-adjacent attacker to bypass the AngularJS sandbox and achieve arbitrary JavaScript execution within the browser sessions of SicuroWeb operators. The attack is facilitated by plaintext HTTP deployments, where a man-in-the-middle (MITM) attacker can inject the malicious payload without requiring active user interaction. This issue exposes operators to potential session hijacking, DOM manipulation, and persistent browser compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker positions themselves as a Man-in-the-Middle (MITM) on the network.</li>
<li>Operator initiates a session with the vulnerable Beghelli Sicuro24 SicuroWeb application over plaintext HTTP.</li>
<li>The MITM attacker intercepts the HTTP traffic between the operator and the SicuroWeb application.</li>
<li>The attacker injects a malicious AngularJS template injection payload into the HTTP response destined for the operator&rsquo;s browser.</li>
<li>The operator&rsquo;s browser processes the injected HTTP response, rendering the malicious AngularJS template.</li>
<li>The injected AngularJS template leverages known sandbox escape primitives present in AngularJS 1.5.2.</li>
<li>The sandbox escape allows the attacker to execute arbitrary JavaScript code within the operator&rsquo;s browser session.</li>
<li>The attacker uses the arbitrary JavaScript execution to perform actions such as session hijacking, DOM manipulation for credential harvesting, or establishing persistent browser compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-41468 can lead to significant compromise of Beghelli Sicuro24 SicuroWeb operator sessions. An attacker can hijack active sessions, steal credentials through DOM manipulation, or establish persistent control over the operator&rsquo;s browser. Due to the lack of specific victim numbers or sector targeting information, the potential scope of damage is difficult to quantify but highly dependent on the privileges associated with compromised operator accounts. A successful attack could enable unauthorized access to sensitive data, system configurations, or control functions managed by the SicuroWeb application.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Suspicious AngularJS Template Injection</code> to identify potential exploitation attempts against web applications leveraging AngularJS, focusing on HTTP requests containing suspicious template expressions.</li>
<li>Implement network monitoring for HTTP traffic to detect potential MITM attacks, focusing on connections to the SicuroWeb application, using the rule <code>Detect Plaintext HTTP Traffic</code>.</li>
<li>Upgrade Beghelli Sicuro24 SicuroWeb to a version that no longer utilizes AngularJS 1.5.2 or implement a robust Content Security Policy (CSP) to mitigate the impact of potential template injection attacks.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-41468</category><category>angularjs</category><category>template-injection</category><category>mitm</category></item></channel></rss>