CVE-2021-38705

8.8 HIGH

📋 TL;DR

CVE-2021-38705 is a Cross-Site Request Forgery vulnerability in ClinicCases 7.3.3 that allows attackers to trick authenticated users into performing unintended actions. When exploited, it can create secondary administrator accounts for attackers, compromising the entire application. This affects all ClinicCases 7.3.3 installations with authenticated users.

💻 Affected Systems

Products:
  • ClinicCases
Versions: 7.3.3
Operating Systems: Any
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of ClinicCases 7.3.3 are vulnerable by default. The vulnerability requires authenticated users but affects all privilege levels.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover through creation of attacker-controlled administrator accounts, leading to data theft, system manipulation, and privilege escalation across the entire application.

🟠

Likely Case

Attackers create backdoor administrator accounts to maintain persistent access, potentially leading to data exfiltration, unauthorized modifications, and further exploitation.

🟢

If Mitigated

With proper CSRF protections and user awareness, exploitation attempts fail, maintaining normal system operations and security posture.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires tricking authenticated users into clicking malicious links. Public proof-of-concept code exists on GitHub repositories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.3.4 or later

Vendor Advisory: https://github.com/judsonmitchell/ClinicCases/releases

Restart Required: Yes

Instructions:

1. Backup current ClinicCases installation and database. 2. Download ClinicCases 7.3.4 or later from official GitHub releases. 3. Replace vulnerable files with patched version. 4. Restart web server and application services. 5. Verify functionality and test critical workflows.

🔧 Temporary Workarounds

CSRF Token Implementation

all

Manually implement CSRF tokens for all state-changing requests if patching is delayed

SameSite Cookie Enforcement

all

Configure session cookies with SameSite=Strict attribute to prevent CSRF attacks

Set-Cookie: session=value; SameSite=Strict; Secure; HttpOnly

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to detect and block CSRF patterns
  • Enforce strict user session management with short timeouts and re-authentication for sensitive actions

🔍 How to Verify

Check if Vulnerable:

Check if running ClinicCases version 7.3.3 by examining application version in admin panel or configuration files

Check Version:

Check admin dashboard or examine application configuration files for version information

Verify Fix Applied:

Verify installation shows version 7.3.4 or later and test CSRF protection by attempting to submit forms without valid tokens

📡 Detection & Monitoring

Log Indicators:

  • Multiple administrator account creations from single user session
  • Unusual POST requests without referrer headers
  • Failed CSRF token validation attempts

Network Indicators:

  • HTTP requests with missing or invalid CSRF tokens
  • Requests originating from unexpected domains with authenticated session cookies

SIEM Query:

source="web_logs" AND (uri="*/admin/create*" OR uri="*/user/add*") AND NOT referrer="*cliniccases*"

🔗 References

📤 Share & Export