CVE-2020-28856

7.5 HIGH

📋 TL;DR

This vulnerability allows attackers to bypass IP-based access controls in OpenAsset Digital Asset Management by spoofing the X-Forwarded-For HTTP header with localhost addresses like 127.0.0.1. This affects all OpenAsset DAM users up to version 12.0.19 who rely on IP address restrictions for security.

💻 Affected Systems

Products:
  • OpenAsset Digital Asset Management
Versions: through 12.0.19
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using IP-based access controls; systems without IP restrictions are not vulnerable to this specific bypass.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete bypass of all IP-based access controls allowing unauthorized access to protected digital assets, potentially leading to data theft, modification, or deletion.

🟠

Likely Case

Unauthorized users gain access to restricted areas of the DAM system, potentially accessing sensitive digital assets they shouldn't have permission to view.

🟢

If Mitigated

Limited impact if additional authentication layers or network segmentation are in place beyond IP-based controls.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only HTTP header manipulation; no authentication or special privileges needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 12.0.20 or later

Vendor Advisory: http://openasset.com

Restart Required: Yes

Instructions:

1. Backup your OpenAsset DAM installation and database. 2. Download and install OpenAsset DAM version 12.0.20 or later from the vendor portal. 3. Follow the vendor's upgrade documentation. 4. Restart the OpenAsset service. 5. Verify the fix by testing IP access controls.

🔧 Temporary Workarounds

Web Server Header Filtering

all

Configure your web server (Apache/Nginx/IIS) to strip or validate X-Forwarded-For headers before they reach OpenAsset.

# Apache: mod_headers
Header unset X-Forwarded-For
# Nginx: 
proxy_set_header X-Forwarded-For $remote_addr;
# IIS: URL Rewrite rule to remove header

Network ACL Enhancement

all

Implement additional network-level access controls at firewall/load balancer to complement application-level controls.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate OpenAsset DAM from untrusted networks.
  • Deploy a Web Application Firewall (WAF) with rules to detect and block X-Forwarded-For header manipulation.

🔍 How to Verify

Check if Vulnerable:

Send an HTTP request to OpenAsset with X-Forwarded-For: 127.0.0.1 header from an unauthorized IP address. If access is granted, the system is vulnerable.

Check Version:

Check OpenAsset admin interface or consult vendor documentation for version information.

Verify Fix Applied:

Repeat the vulnerable test after patching; access should be denied when using spoofed X-Forwarded-For headers.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests with X-Forwarded-For: 127.0.0.1 or similar localhost addresses from external IPs
  • Successful authentication/access from unexpected IP addresses

Network Indicators:

  • HTTP traffic with manipulated X-Forwarded-For headers
  • Unusual access patterns bypassing normal IP restrictions

SIEM Query:

source="openasset" AND (http_header="X-Forwarded-For: 127.0.0.1" OR http_header="X-Forwarded-For: localhost")

🔗 References

📤 Share & Export