CVE-2021-29995
📋 TL;DR
This CSRF vulnerability in CloverDX Server Console allows attackers to trick authenticated users into executing arbitrary actions, including script execution, by sending malicious requests. It affects all CloverDX installations through version 5.9.0. Any organization using vulnerable versions with the Server Console accessible is at risk.
💻 Affected Systems
- CloverDX
📦 What is this software?
Cloverdx by Cloverdx
Cloverdx by Cloverdx
Cloverdx by Cloverdx
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise through remote code execution, data theft, and lateral movement within the network.
Likely Case
Unauthorized data access, configuration changes, and potential script execution leading to data manipulation.
If Mitigated
Limited impact if proper CSRF protections and network segmentation are implemented.
🎯 Exploit Status
Exploit requires victim to be authenticated; public proof-of-concept demonstrates code execution.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 5.10, 5.9.1, 5.8.2, or 5.7.1
Vendor Advisory: https://support.cloverdx.com/releases/
Restart Required: Yes
Instructions:
1. Download patched version from CloverDX support portal. 2. Backup current installation. 3. Install patched version following vendor documentation. 4. Restart CloverDX services.
🔧 Temporary Workarounds
Implement CSRF Tokens
allAdd CSRF protection tokens to all forms and state-changing requests in custom applications.
Network Segmentation
allRestrict access to CloverDX Server Console to trusted networks only.
🧯 If You Can't Patch
- Implement strict network access controls to limit Server Console access to trusted IPs only.
- Use web application firewalls (WAF) with CSRF protection rules and monitor for suspicious requests.
🔍 How to Verify
Check if Vulnerable:
Check CloverDX version via Server Console interface or configuration files; versions ≤5.9.0 are vulnerable.
Check Version:
Check version in CloverDX Server Console web interface or review installation documentation.
Verify Fix Applied:
Verify installed version is 5.10, 5.9.1, 5.8.2, or 5.7.1; test CSRF protection with security tools.
📡 Detection & Monitoring
Log Indicators:
- Unexpected script execution logs
- Unauthorized configuration changes in audit logs
- CSRF token validation failures
Network Indicators:
- Requests to Server Console endpoints without proper referrer headers
- Suspicious POST requests from unexpected sources
SIEM Query:
source="cloverdx" AND (event="script_execution" OR event="config_change") AND user!="expected_user"
🔗 References
- http://packetstormsecurity.com/files/163697/CloverDX-5.9.0-Code-Execution-Cross-Site-Request-Forgery.html
- https://support.cloverdx.com/releases/
- https://support1.cloverdx.com/hc/en-us/articles/360021006520
- http://packetstormsecurity.com/files/163697/CloverDX-5.9.0-Code-Execution-Cross-Site-Request-Forgery.html
- https://support.cloverdx.com/releases/
- https://support1.cloverdx.com/hc/en-us/articles/360021006520