{"id":24274,"date":"2025-06-27T16:08:30","date_gmt":"2025-06-27T14:08:30","guid":{"rendered":"https:\/\/herolab.usd.de\/usd-2025-0028\/"},"modified":"2025-07-01T10:28:46","modified_gmt":"2025-07-01T08:28:46","slug":"usd-2025-0028","status":"publish","type":"page","link":"https:\/\/herolab.usd.de\/en\/usd-2025-0028\/","title":{"rendered":"usd-2025-0028"},"content":{"rendered":"<p>[et_pb_section fb_built=\"1\" _builder_version=\"4.21.0\" _module_preset=\"default\" background_color=\"#2E353D\" custom_padding=\"||0px|||\" global_colors_info=\"{}\"][et_pb_row _builder_version=\"4.25.2\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"||13px|||\" global_colors_info=\"{}\"]<\/p>\n<h1>usd-2025-0028 | agorum core open 11.9.1.3-1857 - Incorrect Authorization<\/h1>\n<h1><\/h1>\n<p><strong>Product<\/strong>: agorum core open<br \/><strong>Affected Version<\/strong>: 1.9.1.3-1857<br \/><strong>Vulnerability Type<\/strong>: Incorrect Authorization (CWE-863)<br \/><strong>Security Risk<\/strong>: High<br \/><strong>Vendor<\/strong>: agorum\u00ae Software GmbH<br \/><strong>Vendor URL<\/strong>: <a>https:\/\/www.agorum.com\/<\/a><br \/><strong>Vendor acknowledged vulnerability<\/strong>: Yes<br \/><strong>Vendor Status<\/strong>: Fixed<br \/><strong>CVE Number<\/strong>: Requested<br \/><strong>CVE Link<\/strong>: Requested<br \/><strong>Advisory ID<\/strong>: usd-2025-0028<\/p>\n<h3>Description<\/h3>\n<p>Agorum core open fails to check for administrative credentials on a large list of endpoints, allowing low privileged users to access admin functionality. This includes downloading server logs and stack traces, mass deleting files, changing access rights on uploaded files and more.<br \/>Additionally, after the first launch of a fresh installation, some of these endpoints are accessible without any authentication whatsoever. This allows for the listing of directories and endpoints in agorum core open, as well as downloading server logs and stack traces.<\/p>\n<h3>Proof of Concept<\/h3>\n<p>The following endpoints and their functionality can be accessed as a low privileged user.<\/p>\n<div class=\"codehilite\" style=\"background: #263238;color: #eff\">\n<ul>\n<li style=\"line-height: 125%\"><span style=\"background: #263238\"><a href=\"http:\/\/localhost\/roiwebui\/address_module\/tools\/ReindexAddressContainers.jsp\" target=\"_blank\" rel=\"noopener\">http:\/\/localhost\/roiwebui\/address_module\/tools\/ReindexAddressContainers.jsp<\/a><\/span><\/li>\n<li style=\"line-height: 125%\"><span style=\"background: #263238\"><a href=\"http:\/\/localhost\/roiwebui\/roiprotocols_module\/tools\/SendMailFromMailbox.jsp\" target=\"_blank\" rel=\"noopener\">http:\/\/localhost\/roiwebui\/roiprotocols_module\/tools\/SendMailFromMailbox.jsp<\/a><\/span><\/li>\n<li style=\"line-height: 125%\"><span style=\"background: #263238\"><a href=\"http:\/\/localhost\/roiwebui\/roiwebui_module\/tools\/DownloadLog.jsp\" target=\"_blank\" rel=\"noopener\">http:\/\/localhost\/roiwebui\/roiwebui_module\/tools\/DownloadLog.jsp<\/a><\/span><\/li>\n<li style=\"line-height: 125%\"><span style=\"background: #263238\"><a href=\"http:\/\/localhost\/roiwebui\/roiwebui_module\/tools\/Stacktrace.jsp\" target=\"_blank\" rel=\"noopener\">http:\/\/localhost\/roiwebui\/roiwebui_module\/tools\/Stacktrace.jsp<\/a><\/span><\/li>\n<li style=\"line-height: 125%\"><span style=\"background: #263238\"><a href=\"http:\/\/localhost\/roiwebui\/roiwebui_module\/tools\/Stacktrace2.jsp\" target=\"_blank\" rel=\"noopener\">http:\/\/localhost\/roiwebui\/roiwebui_module\/tools\/Stacktrace2.jsp<\/a><\/span><\/li>\n<li style=\"line-height: 125%\"><span style=\"background: #263238\"><a href=\"http:\/\/localhost\/roiwebui\/roiwebui_module\/tools\/PrintIndexJson.jsp\" target=\"_blank\" rel=\"noopener\">http:\/\/localhost\/roiwebui\/roiwebui_module\/tools\/PrintIndexJson.jsp<\/a><\/span><\/li>\n<li style=\"line-height: 125%\"><span style=\"background: #263238\"><a href=\"http:\/\/localhost\/roiwebui\/roiwebui_module\/tools\/MassDelete.jsp\" target=\"_blank\" rel=\"noopener\">http:\/\/localhost\/roiwebui\/roiwebui_module\/tools\/MassDelete.jsp<\/a><\/span><\/li>\n<li style=\"line-height: 125%\"><span style=\"background: #263238\"><a href=\"http:\/\/localhost\/roiwebui\/roiwebui_module\/tools\/ScopeAclTool.jsp\" target=\"_blank\" rel=\"noopener\">http:\/\/localhost\/roiwebui\/roiwebui_module\/tools\/ScopeAclTool.jsp<\/a><\/span><\/li>\n<li style=\"line-height: 125%\"><span style=\"background: #263238\">http:\/\/localhost\/roiwebui\/roiwebui_module\/tools\/TestPerformance.jsp<\/span><\/li>\n<\/ul>\n<\/div>\n<p>Furthermore, the endpoints listed below can be accessed without authentication on the first launch after a fresh installation.<\/p>\n<div class=\"codehilite\" style=\"background: #263238;color: #eff\">\n<ul>\n<li style=\"line-height: 125%\"><span style=\"background: #263238\"><a href=\"http:\/\/localhost\/roiwebui\/\" target=\"_blank\" rel=\"noopener\">http:\/\/localhost\/roiwebui\/<\/a><\/span><\/li>\n<li style=\"line-height: 125%\"><span style=\"background: #263238\"><a href=\"http:\/\/localhost\/roiwebui\/roiwebui_module\/tools\/DownloadLog.jsp\" target=\"_blank\" rel=\"noopener\">http:\/\/localhost\/roiwebui\/roiwebui_module\/tools\/DownloadLog.jsp<\/a><\/span><\/li>\n<li style=\"line-height: 125%\"><span style=\"background: #263238\"><a href=\"http:\/\/localhost\/roiwebui\/roiwebui_module\/tools\/Stacktrace.jsp\" target=\"_blank\" rel=\"noopener\">http:\/\/localhost\/roiwebui\/roiwebui_module\/tools\/Stacktrace.jsp<\/a><\/span><\/li>\n<li style=\"line-height: 125%\"><span style=\"background: #263238\">http:\/\/localhost\/roiwebui\/roiwebui_module\/tools\/Stacktrace2.jsp<\/span><\/li>\n<\/ul>\n<\/div>\n<h3>Fix<\/h3>\n<p>&nbsp;<\/p>\n<p>The following line can be added or adjusted in the given <strong>.jsp<\/strong> files to restrict access to administrative users only.<\/p>\n<p>Users of agorum core open can upgrade to versions 11.9.2 or 11.10.1.<\/p>\n<div class=\"codehilite\" style=\"background: #263238;color: #eff\">\n<pre style=\"line-height: 125%\"><span style=\"background: #263238\"><\/span><span class=\"k\" style=\"background: #263238;color: #bb80b3\">if<\/span><span class=\"w\" style=\"background: #263238;color: #eff\"> <\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">(<\/span><span class=\"n\" style=\"background: #263238;color: #eff\">sessionController<\/span><span class=\"w\" style=\"background: #263238;color: #eff\"> <\/span><span class=\"o\" style=\"background: #263238;color: #89ddff\">!=<\/span><span class=\"w\" style=\"background: #263238;color: #eff\"> <\/span><span class=\"kc\" style=\"background: #263238;color: #89ddff\">null<\/span><span class=\"w\" style=\"background: #263238;color: #eff\"> <\/span><span class=\"o\" style=\"background: #263238;color: #89ddff\">&amp;&amp;<\/span><span class=\"w\" style=\"background: #263238;color: #eff\"> <\/span><span class=\"n\" style=\"background: #263238;color: #eff\">sessionController<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">.<\/span><span class=\"na\" style=\"background: #263238;color: #bb80b3\">isAdminEnabled<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">())<\/span><span class=\"w\" style=\"background: #263238;color: #eff\"> <\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">{<\/span><span class=\"w\" style=\"background: #263238;color: #eff\"> <\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">...<\/span><span class=\"w\" style=\"background: #263238;color: #eff\"> <\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">}<br \/><\/span><\/pre>\n<\/div>\n<h3><\/h3>\n<h3><\/h3>\n<h3>References<\/h3>\n<ul>\n<ul>\n<li><a href=\"https:\/\/owasp.org\/www-community\/Broken_Access_Control\" target=\"_blank\" rel=\"noopener\">https:\/\/owasp.org\/www-community\/Broken_Access_Control<\/a><\/li>\n<\/ul>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3>Timeline<\/h3>\n<ul>\n<li><strong>2025-05-05<\/strong>: First contact request via mail.<\/li>\n<li><strong>2025-05-05<\/strong>: The vendor has confirmed the delivery and has begun investigating the matter.<\/li>\n<li><strong>2025-05-07<\/strong>: The vendor has begun addressing and fixing the issue.<\/li>\n<li><strong>2025-05-15<\/strong>: The vendor has addressed and fixed the vulnerability within the cloud instances.<\/li>\n<li><strong>2025-05-30<\/strong>: The vendor released fixed versions 11.9.2 and 11.10.1.<\/li>\n<li><strong>2025-06-27<\/strong>: This advisory is published.<\/li>\n<\/ul>\n<h3>Credits<\/h3>\n<p>This security vulnerability was identified by Jakob Steeg, Roman Hergenreder, Florian Kimmes, Kai Glauber, DR and Ole Wagner of usd AG.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>usd-2025-0028 | agorum core open 11.9.1.3-1857 - Incorrect Authorization Product: agorum core openAffected Version: 1.9.1.3-1857Vulnerability Type: Incorrect Authorization (CWE-863)Security Risk: HighVendor: agorum\u00ae Software GmbHVendor URL: https:\/\/www.agorum.com\/Vendor acknowledged vulnerability: YesVendor Status: FixedCVE Number: RequestedCVE Link: RequestedAdvisory ID: usd-2025-0028 Description Agorum core open fails to check for administrative credentials on a large list of endpoints, allowing low [&hellip;]<\/p>\n","protected":false},"author":118,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"class_list":["post-24274","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/24274","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/users\/118"}],"replies":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/comments?post=24274"}],"version-history":[{"count":3,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/24274\/revisions"}],"predecessor-version":[{"id":24277,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/24274\/revisions\/24277"}],"wp:attachment":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/media?parent=24274"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}