CVE-2021-30224

8.8 HIGH

📋 TL;DR

This CSRF vulnerability in Rukovoditel v2.8.3 allows attackers to trick authenticated administrators into unknowingly creating new admin accounts with attacker-controlled credentials. Any organization using the vulnerable version of Rukovoditel project management software is affected, particularly those with internet-facing installations.

💻 Affected Systems

Products:
  • Rukovoditel
Versions: v2.8.3
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations with admin access enabled. The vulnerability requires an authenticated admin session to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the Rukovoditel instance with attacker creating persistent admin accounts, leading to data theft, system manipulation, and potential lateral movement to other systems.

🟠

Likely Case

Attackers create hidden admin accounts to maintain persistent access, steal sensitive project data, and potentially modify system configurations.

🟢

If Mitigated

With proper CSRF protections and network segmentation, impact is limited to the Rukovoditel application only, preventing lateral movement.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires tricking an authenticated admin into visiting a malicious page. Proof-of-concept code is publicly available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v2.8.4 or later

Vendor Advisory: https://forum.rukovoditel.net/viewtopic.php?f=19&t=2760

Restart Required: No

Instructions:

1. Backup your Rukovoditel installation and database. 2. Download the latest version from the official Rukovoditel website. 3. Replace the existing installation files with the updated version. 4. Verify the update by checking the version in the admin panel.

🔧 Temporary Workarounds

CSRF Token Implementation

all

Manually add CSRF tokens to admin user creation forms

SameSite Cookie Enforcement

all

Configure session cookies with SameSite=Strict attribute

Set-Cookie: session=value; SameSite=Strict; Secure; HttpOnly

🧯 If You Can't Patch

  • Implement strict network access controls to limit Rukovoditel access to trusted IP addresses only
  • Require multi-factor authentication for all admin accounts and monitor for unusual admin user creation

🔍 How to Verify

Check if Vulnerable:

Check if your Rukovoditel version is 2.8.3 by logging into admin panel and viewing version information

Check Version:

Check admin panel dashboard or login page footer for version information

Verify Fix Applied:

After updating, verify version shows 2.8.4 or later and test that CSRF tokens are present in admin user creation forms

📡 Detection & Monitoring

Log Indicators:

  • Unexpected admin user creation events
  • Multiple failed login attempts followed by successful admin login from new user

Network Indicators:

  • HTTP POST requests to user creation endpoints without proper referrer headers
  • Unusual traffic patterns to admin interfaces

SIEM Query:

source="rukovoditel_logs" AND (event="user_created" AND user_role="admin") | stats count by src_ip, user

🔗 References

📤 Share & Export