CVE-2020-37158
📋 TL;DR
CVE-2020-37158 is a CSRF vulnerability in AVideo Platform 8.1 that allows attackers to reset user passwords without authentication by exploiting the password recovery mechanism. Attackers can craft malicious requests to the recoverPass endpoint using stolen recovery tokens to change account credentials. This affects all AVideo Platform 8.1 installations with default configurations.
💻 Affected Systems
- AVideo Platform
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers gain unauthorized access to administrative accounts, potentially compromising the entire platform, exfiltrating sensitive data, or deploying malware.
Likely Case
Attackers reset passwords for regular user accounts, leading to unauthorized access, data theft, or account takeover for phishing/spam campaigns.
If Mitigated
With proper CSRF protections and token validation, exploitation is prevented, maintaining normal authentication flow security.
🎯 Exploit Status
Exploitation requires the attacker to obtain or predict the user's password recovery token, which can be done through social engineering or token leakage.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 8.2 or later
Vendor Advisory: https://github.com/WWBN/AVideo/releases
Restart Required: No
Instructions:
1. Backup your current installation. 2. Download and install AVideo Platform version 8.2 or later from the official GitHub repository. 3. Verify the update by checking the version in the admin panel.
🔧 Temporary Workarounds
Implement CSRF Protection
allAdd CSRF tokens to the password recovery endpoint and validate them on the server side.
Modify recoverPass.php to include and validate CSRF tokens
Disable Password Recovery
allTemporarily disable the password recovery functionality until patched.
Comment out or remove the recoverPass endpoint in your web server configuration
🧯 If You Can't Patch
- Implement network-level controls such as WAF rules to block malicious requests to the recoverPass endpoint.
- Enforce strong password policies and multi-factor authentication to reduce impact if accounts are compromised.
🔍 How to Verify
Check if Vulnerable:
Check if your AVideo installation is version 8.1 by logging into the admin panel and viewing the version information.
Check Version:
Check the version in the admin panel under 'System Info' or inspect the source code for version markers.
Verify Fix Applied:
After updating, confirm the version is 8.2 or later in the admin panel and test the password recovery functionality with CSRF tokens.
📡 Detection & Monitoring
Log Indicators:
- Multiple failed password recovery attempts from the same IP
- Unusual patterns of requests to recoverPass endpoint
Network Indicators:
- HTTP POST requests to recoverPass without proper CSRF tokens
- Suspicious referrer headers in password reset requests
SIEM Query:
source="web_server_logs" AND uri="/recoverPass" AND method="POST" AND NOT csrf_token=*