CVE-2022-0611
📋 TL;DR
CVE-2022-0611 is a missing authorization vulnerability in Snipe-IT asset management software that allows authenticated users to access unauthorized functionality. This affects all Snipe-IT installations running versions prior to 5.3.11. Attackers with valid user accounts can perform actions beyond their intended permissions.
💻 Affected Systems
- snipe/snipe-it
📦 What is this software?
Snipe It by Snipeitapp
⚠️ Risk & Real-World Impact
Worst Case
Privileged user data exposure, unauthorized asset modifications, or administrative actions performed by lower-privileged users leading to data integrity loss.
Likely Case
Unauthorized access to sensitive asset information, modification of asset records, or privilege escalation within the application.
If Mitigated
Limited impact with proper role-based access controls and network segmentation, though authorization bypass remains possible.
🎯 Exploit Status
Exploitation requires valid user credentials. The vulnerability is in authorization logic, making exploitation straightforward once authenticated.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 5.3.11
Vendor Advisory: https://github.com/snipe/snipe-it/commit/321be4733d3997fc738f0118e1b9af5905f95439
Restart Required: Yes
Instructions:
1. Backup your Snipe-IT database and files. 2. Update via Composer: 'composer update snipe/snipe-it'. 3. Run database migrations: 'php artisan migrate'. 4. Clear cache: 'php artisan config:clear && php artisan cache:clear'. 5. Restart web server.
🔧 Temporary Workarounds
Temporary Access Restriction
allImplement network-level restrictions to limit Snipe-IT access to trusted users only.
Enhanced Monitoring
allIncrease logging and monitoring of user activities for suspicious authorization attempts.
🧯 If You Can't Patch
- Implement strict network segmentation and firewall rules to limit Snipe-IT access
- Enforce strong authentication policies and regularly audit user permissions
🔍 How to Verify
Check if Vulnerable:
Check Snipe-IT version in admin panel or via 'php artisan --version' command. If version is below 5.3.11, system is vulnerable.
Check Version:
php artisan --version
Verify Fix Applied:
Confirm version is 5.3.11 or higher. Test user permissions to ensure authorization checks are working properly.
📡 Detection & Monitoring
Log Indicators:
- Unauthorized access attempts in application logs
- User performing actions outside their role permissions
Network Indicators:
- Unusual API calls from authenticated users
- Requests to endpoints that should be restricted
SIEM Query:
source="snipe-it-logs" AND (event="unauthorized_access" OR user_role_mismatch=true)