CVE-2021-31780

7.5 HIGH

📋 TL;DR

This vulnerability in MISP allows information disclosure when editing events with sharing groups. An incorrect sharing group association causes the system to reuse a local ID instead of the proper sharing group, potentially exposing sensitive event data to unauthorized users. All MISP instances running version 2.4.141 are affected.

💻 Affected Systems

Products:
  • MISP (Malware Information Sharing Platform)
Versions: 2.4.141
Operating Systems: All platforms running MISP
Default Config Vulnerable: ⚠️ Yes
Notes: All MISP installations running the affected version are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Unauthorized users gain access to sensitive threat intelligence data, including restricted sharing group information, potentially exposing confidential indicators and event details.

🟠

Likely Case

Limited information disclosure where users see event data they shouldn't have access to, potentially violating data sharing agreements and privacy requirements.

🟢

If Mitigated

Minimal impact with proper access controls and monitoring, though the vulnerability still exists in the codebase.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access to edit events and knowledge of the vulnerability. The commit shows the specific code flaw.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after commit a0f08501d2850025892e703f40fb1570c7995478

Vendor Advisory: https://github.com/MISP/MISP/commit/a0f08501d2850025892e703f40fb1570c7995478

Restart Required: No

Instructions:

1. Update MISP to version 2.4.142 or later. 2. Apply the specific commit a0f08501d2850025892e703f40fb1570c7995478 if using custom deployment. 3. Verify the fix by testing event editing with sharing groups.

🔧 Temporary Workarounds

Restrict Event Editing Permissions

all

Limit which users can edit events to reduce attack surface

Disable Sharing Group Features

all

Temporarily disable sharing group functionality if not critical

🧯 If You Can't Patch

  • Implement strict access controls and audit logging for all event editing activities
  • Monitor for unusual access patterns to sharing group data and implement network segmentation

🔍 How to Verify

Check if Vulnerable:

Check MISP version via web interface or by examining the installation directory. Version 2.4.141 is vulnerable.

Check Version:

Check MISP web interface admin panel or examine /var/www/MISP/VERSION.json file

Verify Fix Applied:

Verify version is 2.4.142 or later, or check that commit a0f08501d2850025892e703f40fb1570c7995478 is applied in the codebase.

📡 Detection & Monitoring

Log Indicators:

  • Unusual event edit patterns
  • Multiple failed sharing group associations
  • Access to events outside normal user patterns

Network Indicators:

  • Increased API calls to event editing endpoints
  • Unusual data export patterns

SIEM Query:

source="misp" AND (event="edit" OR event="update") AND sharing_group_id!=null AND user NOT IN [authorized_users]

🔗 References

📤 Share & Export