CVE-2021-29995

8.8 HIGH

📋 TL;DR

This CSRF vulnerability in CloverDX Server Console allows attackers to trick authenticated users into executing arbitrary actions, including script execution, by sending malicious requests. It affects all CloverDX installations through version 5.9.0. Any organization using vulnerable versions with the Server Console accessible is at risk.

💻 Affected Systems

Products:
  • CloverDX
Versions: through 5.9.0
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All installations with Server Console enabled are vulnerable; no special configuration required.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through remote code execution, data theft, and lateral movement within the network.

🟠

Likely Case

Unauthorized data access, configuration changes, and potential script execution leading to data manipulation.

🟢

If Mitigated

Limited impact if proper CSRF protections and network segmentation are implemented.

🌐 Internet-Facing: HIGH - If Server Console is internet-accessible, attackers can exploit via malicious websites.
🏢 Internal Only: MEDIUM - Requires internal user interaction but can still lead to significant compromise.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires victim to be authenticated; public proof-of-concept demonstrates code execution.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.10, 5.9.1, 5.8.2, or 5.7.1

Vendor Advisory: https://support.cloverdx.com/releases/

Restart Required: Yes

Instructions:

1. Download patched version from CloverDX support portal. 2. Backup current installation. 3. Install patched version following vendor documentation. 4. Restart CloverDX services.

🔧 Temporary Workarounds

Implement CSRF Tokens

all

Add CSRF protection tokens to all forms and state-changing requests in custom applications.

Network Segmentation

all

Restrict access to CloverDX Server Console to trusted networks only.

🧯 If You Can't Patch

  • Implement strict network access controls to limit Server Console access to trusted IPs only.
  • Use web application firewalls (WAF) with CSRF protection rules and monitor for suspicious requests.

🔍 How to Verify

Check if Vulnerable:

Check CloverDX version via Server Console interface or configuration files; versions ≤5.9.0 are vulnerable.

Check Version:

Check version in CloverDX Server Console web interface or review installation documentation.

Verify Fix Applied:

Verify installed version is 5.10, 5.9.1, 5.8.2, or 5.7.1; test CSRF protection with security tools.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected script execution logs
  • Unauthorized configuration changes in audit logs
  • CSRF token validation failures

Network Indicators:

  • Requests to Server Console endpoints without proper referrer headers
  • Suspicious POST requests from unexpected sources

SIEM Query:

source="cloverdx" AND (event="script_execution" OR event="config_change") AND user!="expected_user"

🔗 References

📤 Share & Export