CVE-2022-0611

6.3 MEDIUM

📋 TL;DR

CVE-2022-0611 is a missing authorization vulnerability in Snipe-IT asset management software that allows authenticated users to access unauthorized functionality. This affects all Snipe-IT installations running versions prior to 5.3.11. Attackers with valid user accounts can perform actions beyond their intended permissions.

💻 Affected Systems

Products:
  • snipe/snipe-it
Versions: All versions prior to 5.3.11
Operating Systems: All platforms running Snipe-IT
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all Snipe-IT deployments regardless of configuration. Requires authenticated user access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Privileged user data exposure, unauthorized asset modifications, or administrative actions performed by lower-privileged users leading to data integrity loss.

🟠

Likely Case

Unauthorized access to sensitive asset information, modification of asset records, or privilege escalation within the application.

🟢

If Mitigated

Limited impact with proper role-based access controls and network segmentation, though authorization bypass remains possible.

🌐 Internet-Facing: HIGH - Internet-facing Snipe-IT instances are directly accessible to attackers who obtain valid credentials.
🏢 Internal Only: MEDIUM - Internal instances still vulnerable to insider threats or compromised internal accounts.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires valid user credentials. The vulnerability is in authorization logic, making exploitation straightforward once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.3.11

Vendor Advisory: https://github.com/snipe/snipe-it/commit/321be4733d3997fc738f0118e1b9af5905f95439

Restart Required: Yes

Instructions:

1. Backup your Snipe-IT database and files. 2. Update via Composer: 'composer update snipe/snipe-it'. 3. Run database migrations: 'php artisan migrate'. 4. Clear cache: 'php artisan config:clear && php artisan cache:clear'. 5. Restart web server.

🔧 Temporary Workarounds

Temporary Access Restriction

all

Implement network-level restrictions to limit Snipe-IT access to trusted users only.

Enhanced Monitoring

all

Increase logging and monitoring of user activities for suspicious authorization attempts.

🧯 If You Can't Patch

  • Implement strict network segmentation and firewall rules to limit Snipe-IT access
  • Enforce strong authentication policies and regularly audit user permissions

🔍 How to Verify

Check if Vulnerable:

Check Snipe-IT version in admin panel or via 'php artisan --version' command. If version is below 5.3.11, system is vulnerable.

Check Version:

php artisan --version

Verify Fix Applied:

Confirm version is 5.3.11 or higher. Test user permissions to ensure authorization checks are working properly.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts in application logs
  • User performing actions outside their role permissions

Network Indicators:

  • Unusual API calls from authenticated users
  • Requests to endpoints that should be restricted

SIEM Query:

source="snipe-it-logs" AND (event="unauthorized_access" OR user_role_mismatch=true)

🔗 References

📤 Share & Export