CVE-2020-28858

8.8 HIGH

📋 TL;DR

CVE-2020-28858 is a Cross-Site Request Forgery (CSRF) vulnerability in OpenAsset Digital Asset Management (DAM) that allows attackers to trick authenticated users into performing unintended actions. All user functions are vulnerable, potentially leading to unauthorized data manipulation or account takeover. Any organization using OpenAsset DAM through version 12.0.19 is affected.

💻 Affected Systems

Products:
  • OpenAsset Digital Asset Management (DAM)
Versions: through 12.0.19
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All installations with default configuration are vulnerable. Requires user authentication for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise where attackers can create admin accounts, delete critical assets, modify user permissions, or exfiltrate sensitive data through authenticated user sessions.

🟠

Likely Case

Unauthorized data manipulation, asset deletion/modification, or privilege escalation through crafted requests that authenticated users unknowingly execute.

🟢

If Mitigated

Limited impact with proper CSRF protections, session management, and network segmentation in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated user sessions. Public exploit details available in security advisories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 12.0.20 or later

Vendor Advisory: http://openasset.com

Restart Required: Yes

Instructions:

1. Backup current installation and data. 2. Download latest version from OpenAsset vendor portal. 3. Follow vendor upgrade documentation. 4. Restart application services. 5. Verify CSRF protections are enabled.

🔧 Temporary Workarounds

Implement CSRF Tokens

all

Add anti-CSRF tokens to all state-changing requests

Requires application code modification - consult OpenAsset documentation

SameSite Cookie Enforcement

all

Configure session cookies with SameSite=Strict attribute

Set-Cookie: session=value; SameSite=Strict; Secure; HttpOnly

🧯 If You Can't Patch

  • Implement web application firewall (WAF) with CSRF protection rules
  • Segment network access to OpenAsset DAM and enforce strict referrer policies

🔍 How to Verify

Check if Vulnerable:

Check OpenAsset DAM version in admin interface or configuration files. Versions 12.0.19 and earlier are vulnerable.

Check Version:

Check admin dashboard or consult OpenAsset documentation for version check procedure

Verify Fix Applied:

Verify version is 12.0.20 or later. Test CSRF protection by attempting to submit forms without valid tokens.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed state-changing requests from same IP
  • Requests missing CSRF tokens
  • Unusual user activity patterns

Network Indicators:

  • HTTP POST requests without referrer headers
  • Requests with crafted parameters targeting user functions

SIEM Query:

source="openasset" AND (http_method="POST" OR http_method="PUT") AND NOT csrf_token=*

🔗 References

📤 Share & Export