CVE-2024-4447 (GCVE-0-2024-4447)
Vulnerability from cvelistv5 – Published: 2024-07-26 02:02 – Updated: 2024-08-01 20:40
VLAI?
Summary
In the System → Maintenance tool, the Logged Users tab surfaces sessionId data for all users via the Direct Web Remoting API (UserSessionAjax.getSessionList.dwr) calls. While this is information that would and should be available to admins who possess "Sign In As" powers, admins who otherwise lack this privilege would still be able to utilize the session IDs to imitate other users.
While this is a very small attack vector that requires very high permissions to execute, its danger lies principally in obfuscating attribution; all Sign In As operations are attributed appropriately in the log files, and a malicious administrator could use this information to render their dealings untraceable — including those admins who have not been granted this ability — such as by using a session ID to generate an API token.
Fixed in: 24.07.12 / 23.01.20 LTS / 23.10.24v13 LTS / 24.04.24v5 LTS
Severity ?
4.9 (Medium)
CWE
- CWE-863 - Incorrect Authorization
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| dotCMS | dotCMS core |
Affected:
4.2.1 , < 23.01.20
(git)
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-4447",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-07-26T15:21:48.573627Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-07-26T15:22:09.063Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T20:40:47.160Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.dotcms.com/security/SI-72"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "dotCMS core",
"vendor": "dotCMS",
"versions": [
{
"lessThan": "23.01.20",
"status": "affected",
"version": "4.2.1",
"versionType": "git"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eIn the \u003cstrong\u003eSystem \u2192 Maintenance\u003c/strong\u003e tool, the Logged Users tab surfaces sessionId data for all users via the Direct Web Remoting API (\u003ccode\u003eUserSessionAjax.getSessionList.dwr\u003c/code\u003e) calls. While this is information that would and should be available to admins who possess \"Sign In As\" powers, admins who otherwise lack this privilege would still be able to utilize the session IDs to imitate other users.\u003c/p\u003e\n\u003cp\u003eWhile this is a very small attack vector that requires very high permissions to execute, its danger lies principally in obfuscating attribution; all Sign In As operations are attributed appropriately in the log files, and a malicious administrator could use this information to render their dealings untraceable \u2014 including those admins who have not been granted this ability \u2014 such as by using a session ID to generate an API token.\u003c/p\u003eFixed in:\u0026nbsp;24.07.12 / 23.01.20 LTS / 23.10.24v13 LTS / 24.04.24v5 LTS"
}
],
"value": "In the System \u2192 Maintenance tool, the Logged Users tab surfaces sessionId data for all users via the Direct Web Remoting API (UserSessionAjax.getSessionList.dwr) calls. While this is information that would and should be available to admins who possess \"Sign In As\" powers, admins who otherwise lack this privilege would still be able to utilize the session IDs to imitate other users.\n\n\nWhile this is a very small attack vector that requires very high permissions to execute, its danger lies principally in obfuscating attribution; all Sign In As operations are attributed appropriately in the log files, and a malicious administrator could use this information to render their dealings untraceable \u2014 including those admins who have not been granted this ability \u2014 such as by using a session ID to generate an API token.\n\nFixed in:\u00a024.07.12 / 23.01.20 LTS / 23.10.24v13 LTS / 24.04.24v5 LTS"
}
],
"impacts": [
{
"capecId": "CAPEC-131",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-131 Resource Leak Exposure"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-863",
"description": "CWE-863 Incorrect Authorization",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-07-26T13:09:54.754Z",
"orgId": "5b9d93f2-25c7-46b4-ab60-d201718c9dd8",
"shortName": "dotCMS"
},
"references": [
{
"url": "https://www.dotcms.com/security/SI-72"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "5b9d93f2-25c7-46b4-ab60-d201718c9dd8",
"assignerShortName": "dotCMS",
"cveId": "CVE-2024-4447",
"datePublished": "2024-07-26T02:02:32.506Z",
"dateReserved": "2024-05-02T19:24:56.680Z",
"dateUpdated": "2024-08-01T20:40:47.160Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"descriptions": "[{\"lang\": \"en\", \"value\": \"In the System \\u2192 Maintenance tool, the Logged Users tab surfaces sessionId data for all users via the Direct Web Remoting API (UserSessionAjax.getSessionList.dwr) calls. While this is information that would and should be available to admins who possess \\\"Sign In As\\\" powers, admins who otherwise lack this privilege would still be able to utilize the session IDs to imitate other users.\\n\\n\\nWhile this is a very small attack vector that requires very high permissions to execute, its danger lies principally in obfuscating attribution; all Sign In As operations are attributed appropriately in the log files, and a malicious administrator could use this information to render their dealings untraceable \\u2014 including those admins who have not been granted this ability \\u2014 such as by using a session ID to generate an API token.\\n\\nFixed in:\\u00a024.07.12 / 23.01.20 LTS / 23.10.24v13 LTS / 24.04.24v5 LTS\"}, {\"lang\": \"es\", \"value\": \"En System ? Maintenance tool, la pesta\\u00f1a Logged Users muestra datos de ID de sesi\\u00f3n para todos los usuarios a trav\\u00e9s de las llamadas Direct Web Remoting API (UserSessionAjax.getSessionList.dwr). Si bien esta es informaci\\u00f3n que estar\\u00eda y deber\\u00eda estar disponible para los administradores que poseen poderes de \\\"Sign In As\\\", los administradores que de otro modo carecer\\u00edan de este privilegio a\\u00fan podr\\u00edan utilizar las ID de sesi\\u00f3n para imitar a otros usuarios. Si bien se trata de un vector de ataque muy peque\\u00f1o que requiere permisos muy elevados para su ejecuci\\u00f3n, su peligro radica principalmente en ofuscar la atribuci\\u00f3n; todas las operaciones de Sign In As se atribuyen adecuadamente en los archivos de registro, y un administrador malintencionado podr\\u00eda usar esta informaci\\u00f3n para hacer que sus transacciones sean imposibles de rastrear (incluidos aquellos administradores a quienes no se les ha otorgado esta capacidad), como mediante el uso de una ID de sesi\\u00f3n para generar un token API. . Corregido en: 24.07.12 / 23.01.20 LTS / 23.10.24v13 LTS / 24.04.24v5 LTS\"}]",
"id": "CVE-2024-4447",
"lastModified": "2024-11-21T09:42:50.960",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"security@dotcms.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N\", \"baseScore\": 4.9, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 1.2, \"impactScore\": 3.6}]}",
"published": "2024-07-26T02:15:10.160",
"references": "[{\"url\": \"https://www.dotcms.com/security/SI-72\", \"source\": \"security@dotcms.com\"}, {\"url\": \"https://www.dotcms.com/security/SI-72\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "security@dotcms.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": "[{\"source\": \"security@dotcms.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-863\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-4447\",\"sourceIdentifier\":\"security@dotcms.com\",\"published\":\"2024-07-26T02:15:10.160\",\"lastModified\":\"2024-11-21T09:42:50.960\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the System \u2192 Maintenance tool, the Logged Users tab surfaces sessionId data for all users via the Direct Web Remoting API (UserSessionAjax.getSessionList.dwr) calls. While this is information that would and should be available to admins who possess \\\"Sign In As\\\" powers, admins who otherwise lack this privilege would still be able to utilize the session IDs to imitate other users.\\n\\n\\nWhile this is a very small attack vector that requires very high permissions to execute, its danger lies principally in obfuscating attribution; all Sign In As operations are attributed appropriately in the log files, and a malicious administrator could use this information to render their dealings untraceable \u2014 including those admins who have not been granted this ability \u2014 such as by using a session ID to generate an API token.\\n\\nFixed in:\u00a024.07.12 / 23.01.20 LTS / 23.10.24v13 LTS / 24.04.24v5 LTS\"},{\"lang\":\"es\",\"value\":\"En System ? Maintenance tool, la pesta\u00f1a Logged Users muestra datos de ID de sesi\u00f3n para todos los usuarios a trav\u00e9s de las llamadas Direct Web Remoting API (UserSessionAjax.getSessionList.dwr). Si bien esta es informaci\u00f3n que estar\u00eda y deber\u00eda estar disponible para los administradores que poseen poderes de \\\"Sign In As\\\", los administradores que de otro modo carecer\u00edan de este privilegio a\u00fan podr\u00edan utilizar las ID de sesi\u00f3n para imitar a otros usuarios. Si bien se trata de un vector de ataque muy peque\u00f1o que requiere permisos muy elevados para su ejecuci\u00f3n, su peligro radica principalmente en ofuscar la atribuci\u00f3n; todas las operaciones de Sign In As se atribuyen adecuadamente en los archivos de registro, y un administrador malintencionado podr\u00eda usar esta informaci\u00f3n para hacer que sus transacciones sean imposibles de rastrear (incluidos aquellos administradores a quienes no se les ha otorgado esta capacidad), como mediante el uso de una ID de sesi\u00f3n para generar un token API. . Corregido en: 24.07.12 / 23.01.20 LTS / 23.10.24v13 LTS / 24.04.24v5 LTS\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security@dotcms.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":4.9,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.2,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"security@dotcms.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-863\"}]}],\"references\":[{\"url\":\"https://www.dotcms.com/security/SI-72\",\"source\":\"security@dotcms.com\"},{\"url\":\"https://www.dotcms.com/security/SI-72\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.dotcms.com/security/SI-72\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-01T20:40:47.160Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-4447\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-07-26T15:21:48.573627Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-07-26T15:22:01.920Z\"}}], \"cna\": {\"source\": {\"discovery\": \"UNKNOWN\"}, \"impacts\": [{\"capecId\": \"CAPEC-131\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-131 Resource Leak Exposure\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 4.9, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"HIGH\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"dotCMS\", \"product\": \"dotCMS core\", \"versions\": [{\"status\": \"affected\", \"version\": \"4.2.1\", \"lessThan\": \"23.01.20\", \"versionType\": \"git\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://www.dotcms.com/security/SI-72\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the System \\u2192 Maintenance tool, the Logged Users tab surfaces sessionId data for all users via the Direct Web Remoting API (UserSessionAjax.getSessionList.dwr) calls. While this is information that would and should be available to admins who possess \\\"Sign In As\\\" powers, admins who otherwise lack this privilege would still be able to utilize the session IDs to imitate other users.\\n\\n\\nWhile this is a very small attack vector that requires very high permissions to execute, its danger lies principally in obfuscating attribution; all Sign In As operations are attributed appropriately in the log files, and a malicious administrator could use this information to render their dealings untraceable \\u2014 including those admins who have not been granted this ability \\u2014 such as by using a session ID to generate an API token.\\n\\nFixed in:\\u00a024.07.12 / 23.01.20 LTS / 23.10.24v13 LTS / 24.04.24v5 LTS\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003eIn the \u003cstrong\u003eSystem \\u2192 Maintenance\u003c/strong\u003e tool, the Logged Users tab surfaces sessionId data for all users via the Direct Web Remoting API (\u003ccode\u003eUserSessionAjax.getSessionList.dwr\u003c/code\u003e) calls. While this is information that would and should be available to admins who possess \\\"Sign In As\\\" powers, admins who otherwise lack this privilege would still be able to utilize the session IDs to imitate other users.\u003c/p\u003e\\n\u003cp\u003eWhile this is a very small attack vector that requires very high permissions to execute, its danger lies principally in obfuscating attribution; all Sign In As operations are attributed appropriately in the log files, and a malicious administrator could use this information to render their dealings untraceable \\u2014 including those admins who have not been granted this ability \\u2014 such as by using a session ID to generate an API token.\u003c/p\u003eFixed in:\u0026nbsp;24.07.12 / 23.01.20 LTS / 23.10.24v13 LTS / 24.04.24v5 LTS\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-863\", \"description\": \"CWE-863 Incorrect Authorization\"}]}], \"providerMetadata\": {\"orgId\": \"5b9d93f2-25c7-46b4-ab60-d201718c9dd8\", \"shortName\": \"dotCMS\", \"dateUpdated\": \"2024-07-26T13:09:54.754Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-4447\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-08-01T20:40:47.160Z\", \"dateReserved\": \"2024-05-02T19:24:56.680Z\", \"assignerOrgId\": \"5b9d93f2-25c7-46b4-ab60-d201718c9dd8\", \"datePublished\": \"2024-07-26T02:02:32.506Z\", \"assignerShortName\": \"dotCMS\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…