CVE-2022-0482

9.1 CRITICAL

📋 TL;DR

This vulnerability in Easy Appointments allows unauthorized actors to access private personal information stored in the application. It affects all users of Easy Appointments versions prior to 1.4.3 who have not applied proper access controls.

💻 Affected Systems

Products:
  • Easy Appointments
Versions: All versions prior to 1.4.3
Operating Systems: All operating systems running Easy Appointments
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all installations of Easy Appointments regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete exposure of all personal data including names, contact information, appointment details, and potentially sensitive medical or business information to attackers.

🟠

Likely Case

Unauthorized access to appointment records and personal information of customers, potentially leading to privacy violations and data breaches.

🟢

If Mitigated

Limited exposure if proper authentication and authorization controls are implemented, though the vulnerability still exists in the codebase.

🌐 Internet-Facing: HIGH - The vulnerability allows information disclosure without authentication, making internet-facing instances particularly vulnerable.
🏢 Internal Only: MEDIUM - Internal instances are still vulnerable but may have additional network-level protections.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is simple to exploit and public proof-of-concept details are available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.4.3

Vendor Advisory: https://github.com/alextselegidis/easyappointments/commit/44af526a6fc5e898bc1e0132b2af9eb3a9b2c466

Restart Required: No

Instructions:

1. Backup your current installation. 2. Download version 1.4.3 or later from GitHub. 3. Replace the vulnerable files with the patched version. 4. Verify the fix by checking the version number.

🔧 Temporary Workarounds

Access Restriction

all

Implement strict access controls and authentication requirements for all appointment-related endpoints.

🧯 If You Can't Patch

  • Implement network-level access controls to restrict who can access the Easy Appointments instance.
  • Deploy a web application firewall (WAF) with rules to detect and block information disclosure attempts.

🔍 How to Verify

Check if Vulnerable:

Check if your Easy Appointments version is below 1.4.3 by examining the version file or checking the admin interface.

Check Version:

Check the version.php file or login to admin panel to see version information.

Verify Fix Applied:

Verify the version is 1.4.3 or higher and test that unauthorized access to personal information endpoints is properly blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to appointment data endpoints
  • Requests to personal information endpoints from unauthorized IPs

Network Indicators:

  • Unusual traffic to /index.php/appointments or similar endpoints without authentication

SIEM Query:

source="web_server" AND (uri="/index.php/appointments" OR uri CONTAINS "appointments") AND status=200 AND NOT user_agent="authorized_client"

🔗 References

📤 Share & Export