CVE-2021-33484

7.5 HIGH

📋 TL;DR

This vulnerability in OnyakTech Comments Pro 3.8 allows attackers to spoof user identities in comment systems. By decompiling the installer to discover hardcoded encryption values, attackers can encrypt arbitrary user IDs and usernames to impersonate other users when posting comments. All installations of Comments Pro 3.8 are affected.

💻 Affected Systems

Products:
  • OnyakTech Comments Pro
Versions: 3.8
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default installation and configuration of the software.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers can impersonate any user, including administrators, to post malicious content, spread misinformation, or conduct social engineering attacks through the comment system.

🟠

Likely Case

Attackers impersonate regular users to post spam, phishing links, or inappropriate content while appearing as legitimate users.

🟢

If Mitigated

With proper monitoring and content moderation, malicious posts can be detected and removed, though identity spoofing remains possible.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires downloading and decompiling the installer, then using discovered values to craft requests.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://twitter.com/onyaktech

Restart Required: No

Instructions:

No official patch available. Consider upgrading to a newer version if available or implementing workarounds.

🔧 Temporary Workarounds

Implement server-side user validation

all

Add server-side checks that validate user sessions independently of encrypted parameters

Disable comment functionality

all

Temporarily disable the Comments Pro module until a fix is available

🧯 If You Can't Patch

  • Implement strict content moderation and review all comments before publication
  • Monitor for unusual comment patterns or multiple posts from the same IP with different user identities

🔍 How to Verify

Check if Vulnerable:

Check if running OnyakTech Comments Pro version 3.8 by examining the application files or configuration

Check Version:

Check the application directory for version information or consult the web interface

Verify Fix Applied:

Test if user impersonation is possible by attempting to post comments with encrypted parameters from other user accounts

📡 Detection & Monitoring

Log Indicators:

  • Multiple comment posts with different user IDs from same IP
  • Comments with mismatched user information

Network Indicators:

  • HTTP POST requests to CommentsService.ashx with manipulated encrypted parameters

SIEM Query:

source="web_server" AND uri="*CommentsService.ashx*" AND method="POST" | stats count by src_ip, user_agent

🔗 References

📤 Share & Export