CVE-2021-43834

9.1 CRITICAL

📋 TL;DR

This vulnerability allows attackers to authenticate as existing users in eLabFTW instances configured with LDAP or SAML single sign-on authentication. It affects eLabFTW versions before 4.2.0 where LDAP/SAML authentication is enabled instead of the default local password mechanism. The vulnerability enables unauthorized access to user accounts and their associated lab notebook data.

💻 Affected Systems

Products:
  • eLabFTW
Versions: All versions prior to 4.2.0
Operating Systems: All platforms running eLabFTW
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when LDAP or SAML authentication is configured and used instead of the default local password authentication.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all user accounts using LDAP/SAML authentication, allowing attackers to access, modify, or delete sensitive research data, intellectual property, and lab records.

🟠

Likely Case

Unauthorized access to multiple user accounts, leading to data theft, data manipulation, or privilege escalation within the eLabFTW system.

🟢

If Mitigated

Limited impact with proper network segmentation, monitoring, and quick patch deployment preventing successful exploitation.

🌐 Internet-Facing: HIGH - Internet-facing eLabFTW instances with LDAP/SAML authentication are directly exploitable by remote attackers.
🏢 Internal Only: MEDIUM - Internal instances are still vulnerable to insider threats or attackers who gain internal network access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

The advisory suggests authentication bypass is possible, but specific exploit details are not publicly documented. Attackers would need to understand the LDAP/SAML implementation flaw.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.2.0

Vendor Advisory: https://github.com/elabftw/elabftw/security/advisories/GHSA-98rp-gx76-33ph

Restart Required: Yes

Instructions:

1. Backup your eLabFTW database and configuration. 2. Download eLabFTW version 4.2.0 or later from GitHub releases. 3. Replace existing installation files with new version. 4. Run database update scripts if required. 5. Restart web server services.

🔧 Temporary Workarounds

Disable LDAP/SAML Authentication

all

Temporarily disable LDAP and SAML authentication methods and revert to local password authentication only.

Edit eLabFTW configuration to set 'auth_type' to 'local' and disable LDAP/SAML settings

Network Access Restrictions

all

Restrict network access to eLabFTW instances to only trusted IP addresses or internal networks.

Configure firewall rules to limit access to eLabFTW web interface

🧯 If You Can't Patch

  • Implement strict network segmentation and firewall rules to limit access to eLabFTW instances
  • Enable detailed authentication logging and monitor for suspicious login attempts

🔍 How to Verify

Check if Vulnerable:

Check eLabFTW version and authentication configuration. If version < 4.2.0 and LDAP/SAML authentication is enabled, the system is vulnerable.

Check Version:

Check eLabFTW web interface admin panel or examine version files in installation directory

Verify Fix Applied:

Verify eLabFTW version is 4.2.0 or higher and test LDAP/SAML authentication functionality.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authentication attempts followed by successful LDAP/SAML logins
  • Unusual user login patterns or locations
  • Authentication logs showing bypass patterns

Network Indicators:

  • Unusual authentication traffic patterns to LDAP/SAML endpoints
  • Authentication requests from unexpected sources

SIEM Query:

source="elabftw" AND (event_type="auth" OR event_type="login") AND (result="success" AND auth_method="ldap" OR auth_method="saml") | stats count by user, src_ip

🔗 References

📤 Share & Export