CVE-2020-28403

8.0 HIGH

📋 TL;DR

A Cross-Site Request Forgery (CSRF) vulnerability in Star Practice Management Web allows attackers to change user privileges, including granting themselves administrative access or removing existing admin accounts. This affects all users of Star Practice Management Web version 2019.2.0.6. Attackers can exploit this by tricking authenticated users into visiting malicious web pages.

💻 Affected Systems

Products:
  • Star Practice Management Web
Versions: 2019.2.0.6
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the web interface component of Star Practice Management software. Requires user authentication for exploitation but no special configuration needed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the application with attacker gaining administrative privileges, ability to delete legitimate admin accounts, and full control over all practice management data and functions.

🟠

Likely Case

Attacker elevates their own privileges to administrator level, gaining unauthorized access to sensitive patient and practice data, with potential for data theft or manipulation.

🟢

If Mitigated

With proper CSRF protections and user awareness, exploitation attempts fail, maintaining normal application security and user privilege separation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires the victim to be authenticated and visit a malicious page. CSRF attacks are well-understood and easily weaponized with basic web development skills.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2019.2.0.7 or later

Vendor Advisory: https://www.starpracticemanagement.com/

Restart Required: Yes

Instructions:

1. Download the latest version from Star Practice Management website. 2. Backup current installation and data. 3. Run the installer to upgrade to version 2019.2.0.7 or later. 4. Restart the application services.

🔧 Temporary Workarounds

Implement CSRF Tokens

all

Add anti-CSRF tokens to all privilege-changing forms and validate them server-side.

Implementation requires code changes to the application, not command-line executable.

SameSite Cookie Attribute

all

Set SameSite=Strict or SameSite=Lax attributes on session cookies to prevent cross-site requests.

Set-Cookie: sessionid=xxx; SameSite=Strict; Secure; HttpOnly

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to detect and block CSRF attempts targeting privilege escalation endpoints.
  • Educate users about phishing risks and implement strict access controls with principle of least privilege.

🔍 How to Verify

Check if Vulnerable:

Check application version in Help > About menu. If version is exactly 2019.2.0.6, the system is vulnerable.

Check Version:

Check via application GUI: Help > About menu in Star Practice Management Web interface.

Verify Fix Applied:

Verify version is 2019.2.0.7 or higher in Help > About menu. Test privilege change forms for presence of CSRF tokens.

📡 Detection & Monitoring

Log Indicators:

  • Multiple privilege escalation attempts from same user in short time
  • Admin role changes from non-admin users
  • Failed CSRF token validation errors

Network Indicators:

  • HTTP POST requests to user privilege endpoints without Referer headers matching origin
  • Cross-origin requests to administrative functions

SIEM Query:

source="star-practice-logs" AND (event_type="user_role_change" OR uri_path="/admin/privileges") | stats count by src_ip, user

🔗 References

📤 Share & Export