CVE-2020-26515

7.5 HIGH

📋 TL;DR

CVE-2020-26515 is an authentication bypass vulnerability in Intland codeBeamer ALM where the 'remember-me' cookie uses NULL encryption, allowing attackers to decrypt and forge authentication tokens. This affects all users of codeBeamer ALM 10.x through 10.1.SP4 who use the remember-me feature. Attackers can gain unauthorized access to user accounts without valid credentials.

💻 Affected Systems

Products:
  • Intland codeBeamer ALM
Versions: 10.x through 10.1.SP4
Operating Systems: All platforms running codeBeamer ALM
Default Config Vulnerable: ⚠️ Yes
Notes: All installations with remember-me feature enabled are vulnerable. The vulnerability exists in the application code itself.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all user accounts with remember-me cookies enabled, leading to data theft, privilege escalation, and full system compromise.

🟠

Likely Case

Unauthorized access to user accounts, session hijacking, and potential data exfiltration from compromised accounts.

🟢

If Mitigated

Limited impact if remember-me feature is disabled or proper network segmentation prevents external access.

🌐 Internet-Facing: HIGH - Internet-facing instances are directly exploitable by remote attackers without authentication.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems can exploit this, but requires network access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Detailed technical analysis and proof-of-concept available in the Compass Security advisory. Exploitation requires intercepting or obtaining CB_LOGIN cookies.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.1.SP5 and later

Vendor Advisory: https://intland.com/codebeamer/application-lifecycle-management/

Restart Required: Yes

Instructions:

1. Download codeBeamer ALM version 10.1.SP5 or later from Intland. 2. Backup current installation and data. 3. Apply the update following vendor instructions. 4. Restart the application server. 5. Verify the fix by checking version and testing authentication.

🔧 Temporary Workarounds

Disable Remember-Me Feature

all

Disable the remember-me cookie functionality to prevent exploitation.

Modify application configuration to disable 'remember me' feature. Consult codeBeamer documentation for specific configuration changes.

Network Segmentation

all

Restrict access to codeBeamer instances to trusted networks only.

Configure firewall rules to allow only authorized IP addresses to access codeBeamer ports (typically 8080, 8443).

🧯 If You Can't Patch

  • Disable the remember-me feature immediately in all user accounts and application settings.
  • Implement strict network access controls and monitor for unauthorized authentication attempts.

🔍 How to Verify

Check if Vulnerable:

Check if running codeBeamer ALM version 10.x through 10.1.SP4. Examine application logs for remember-me cookie usage patterns.

Check Version:

Check codeBeamer web interface admin panel or application server logs for version information.

Verify Fix Applied:

Verify version is 10.1.SP5 or later. Test that remember-me cookies now use proper encryption by examining cookie values.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed login attempts followed by successful authentication with remember-me cookie
  • Unusual user account access from unexpected locations or IP addresses

Network Indicators:

  • Unencrypted or predictable CB_LOGIN cookie values in HTTP traffic
  • Authentication requests with manipulated cookie values

SIEM Query:

source="codebeamer" AND (event_type="authentication" AND cookie="CB_LOGIN") AND result="success" | stats count by src_ip, user

🔗 References

📤 Share & Export