CVE-2022-0579

6.5 MEDIUM

📋 TL;DR

CVE-2022-0579 is a missing authorization vulnerability in Snipe-IT asset management software that allows authenticated users to access unauthorized functionality. This affects all Snipe-IT installations prior to version 5.3.9. Attackers with valid credentials can exploit this to perform actions beyond their intended permissions.

💻 Affected Systems

Products:
  • Snipe-IT
Versions: All versions prior to 5.3.9
Operating Systems: All platforms running Snipe-IT
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all Snipe-IT deployments regardless of configuration. Requires authenticated user access to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker could escalate privileges, modify critical system settings, access sensitive data, or perform administrative actions without proper authorization.

🟠

Likely Case

Users with limited permissions could access functionality reserved for administrators, potentially modifying asset records, user permissions, or system configurations.

🟢

If Mitigated

With proper access controls and network segmentation, impact is limited to authorized users accessing some additional functionality within their authenticated session scope.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires valid user credentials but minimal technical skill once authenticated. The vulnerability is in authorization logic, not authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.3.9

Vendor Advisory: https://github.com/snipe/snipe-it/commit/db0c0e790892db874573d95f8ae4268b8a011ab1

Restart Required: No

Instructions:

1. Backup your Snipe-IT database and files. 2. Update to Snipe-IT version 5.3.9 or later via Composer: 'composer update snipe/snipe-it'. 3. Run database migrations if required: 'php artisan migrate'. 4. Clear cache: 'php artisan config:clear' and 'php artisan cache:clear'.

🔧 Temporary Workarounds

Temporary Access Restriction

all

Implement additional authorization checks at web server or application firewall level

🧯 If You Can't Patch

  • Implement strict network access controls to limit Snipe-IT access to trusted users only
  • Enable detailed audit logging and monitor for unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Check Snipe-IT version via web interface or by examining composer.lock file for snipe/snipe-it version

Check Version:

grep -A2 'snipe/snipe-it' composer.lock | grep version

Verify Fix Applied:

Confirm version is 5.3.9 or later and test authorization controls for previously vulnerable endpoints

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to admin endpoints by non-admin users
  • User performing actions outside their role permissions

Network Indicators:

  • HTTP requests to sensitive endpoints from non-privileged user accounts

SIEM Query:

source='snipe-it-logs' AND (event_type='unauthorized_access' OR user_role!='admin' AND endpoint CONTAINS '/admin/')

🔗 References

📤 Share & Export