CVE-2021-42115

8.1 HIGH

📋 TL;DR

This vulnerability allows unauthenticated remote attackers to steal session-independent static cookies and escalate privileges to authenticated users in TopEase Platform. It affects all Web Applications operating on Business-DNA Solutions GmbH's TopEase Platform Version <= 7.1.27. The missing HTTPOnly flag enables cookie theft via cross-site scripting or similar attacks.

💻 Affected Systems

Products:
  • Business-DNA Solutions GmbH TopEase Platform
Versions: <= 7.1.27
Operating Systems: All platforms running TopEase
Default Config Vulnerable: ⚠️ Yes
Notes: All web applications operating on the TopEase Platform are affected when using the vulnerable version.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise where attackers gain authenticated access to all functionality, potentially leading to data theft, system manipulation, or further privilege escalation.

🟠

Likely Case

Unauthenticated attackers gain authenticated user privileges, accessing sensitive data and performing actions reserved for legitimate users.

🟢

If Mitigated

With proper controls like WAFs and network segmentation, impact is limited to isolated systems with minimal data exposure.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires cookie theft via XSS or similar client-side attacks, then cookie injection to gain authenticated access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: > 7.1.27

Vendor Advisory: https://confluence.topease.ch/confluence/display/DOC/Release+Notes

Restart Required: Yes

Instructions:

1. Upgrade TopEase Platform to version > 7.1.27. 2. Restart all TopEase services. 3. Verify HTTPOnly flag is set on UID cookie.

🔧 Temporary Workarounds

Implement WAF Cookie Protection

all

Configure web application firewall to protect cookies and detect cookie theft attempts.

Network Segmentation

all

Isolate TopEase systems from untrusted networks and implement strict access controls.

🧯 If You Can't Patch

  • Implement strict network access controls to limit exposure to trusted sources only.
  • Deploy web application firewall with cookie protection and session validation rules.

🔍 How to Verify

Check if Vulnerable:

Check TopEase version via admin interface or configuration files. If version <= 7.1.27, inspect UID cookie for HTTPOnly flag using browser developer tools.

Check Version:

Check TopEase admin interface or configuration files for version information.

Verify Fix Applied:

After upgrade, verify version > 7.1.27 and confirm UID cookie has HTTPOnly flag set in browser developer tools.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authentication attempts followed by successful authentication from same IP
  • Unusual cookie manipulation patterns

Network Indicators:

  • Cookie theft attempts via XSS payloads
  • Unauthenticated requests with UID cookies

SIEM Query:

source="topease" AND (event="authentication" AND result="success" AND src_ip NOT IN trusted_ips) OR (event="cookie_manipulation")

🔗 References

📤 Share & Export