CVE-2020-10130

8.8 HIGH

📋 TL;DR

This vulnerability in SearchBlox allows authenticated users to create multiple super admin accounts, bypassing intended business logic. It affects SearchBlox installations before version 9.1. Attackers with regular user access could escalate privileges to gain full administrative control.

💻 Affected Systems

Products:
  • SearchBlox
Versions: All versions before 9.1
Operating Systems: All platforms running SearchBlox
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access to exploit. The vulnerability exists in the business logic of user management functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise where attackers create persistent super admin accounts, access all data, modify configurations, and potentially pivot to other systems.

🟠

Likely Case

Privilege escalation leading to unauthorized data access, configuration changes, and potential data exfiltration by malicious insiders or compromised accounts.

🟢

If Mitigated

Limited impact with proper access controls, monitoring, and network segmentation preventing lateral movement.

🌐 Internet-Facing: HIGH if SearchBlox is exposed to the internet, as any compromised user account could lead to full system takeover.
🏢 Internal Only: MEDIUM for internal deployments, as attackers would need initial access to the network and valid user credentials.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once an attacker has valid credentials. The business logic bypass is simple to execute.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.1 and later

Vendor Advisory: https://developer.searchblox.com/v9.2/changelog/version-91

Restart Required: Yes

Instructions:

1. Backup current configuration and data. 2. Download SearchBlox version 9.1 or later from the official vendor site. 3. Follow the vendor's upgrade documentation. 4. Restart the SearchBlox service. 5. Verify the upgrade was successful.

🔧 Temporary Workarounds

Restrict User Management Permissions

all

Temporarily restrict user creation and management permissions to only essential administrators.

Configure through SearchBlox admin interface: Settings > User Management > Permissions

Enhanced Monitoring

all

Implement strict monitoring of user creation events and super admin account changes.

Enable audit logging in SearchBlox and configure alerts for user creation events

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate SearchBlox from critical systems
  • Enforce multi-factor authentication for all user accounts and monitor for suspicious privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check SearchBlox version via admin interface or configuration files. If version is below 9.1, the system is vulnerable.

Check Version:

Check admin dashboard or examine searchblox.properties file for version information

Verify Fix Applied:

After upgrading to 9.1 or later, verify the version and test that regular users cannot create super admin accounts.

📡 Detection & Monitoring

Log Indicators:

  • Multiple super admin account creation events
  • User privilege escalation attempts
  • Unusual user management activities

Network Indicators:

  • Unusual authentication patterns
  • Administrative API calls from non-admin users

SIEM Query:

source="searchblox" AND (event_type="user_created" OR event_type="privilege_change") AND user_role="super_admin"

🔗 References

📤 Share & Export