CVE-2022-30356

4.7 MEDIUM

📋 TL;DR

OvalEdge versions 5.2.8.0 and earlier contain a privilege escalation vulnerability where authenticated users with OE_ADMIN role privileges can assign arbitrary roles to other users via a POST request to /user/assignuserrole. This allows administrators to elevate privileges beyond their intended scope, potentially granting unauthorized access to sensitive data and functions.

💻 Affected Systems

Products:
  • OvalEdge
Versions: 5.2.8.0 and earlier
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authentication with OE_ADMIN role privileges to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with OE_ADMIN access could grant themselves or others full administrative privileges, leading to complete system compromise, data exfiltration, or lateral movement within the environment.

🟠

Likely Case

Malicious or compromised administrators could elevate privileges for themselves or accomplices, bypassing intended role-based access controls and accessing sensitive data or functions.

🟢

If Mitigated

With proper access controls and monitoring, the impact is limited to authorized administrators misusing their privileges, which can be detected through audit logs.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access with OE_ADMIN privileges and involves sending a crafted POST request.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.2.8.1 or later

Vendor Advisory: https://cve.offsecguy.com/ovaledge/vulnerabilities/privilege-escalation#cve-2022-30356

Restart Required: Yes

Instructions:

1. Upgrade to OvalEdge version 5.2.8.1 or later. 2. Restart the OvalEdge service. 3. Verify the fix by testing the /user/assignuserrole endpoint.

🔧 Temporary Workarounds

Network Access Control

all

Restrict access to the /user/assignuserrole endpoint using web application firewall rules or network segmentation.

Role-Based Access Review

all

Regularly audit and review user roles and permissions to detect unauthorized privilege changes.

🧯 If You Can't Patch

  • Implement strict access controls and monitoring for users with OE_ADMIN privileges.
  • Regularly audit user role assignments and review logs for suspicious activity on the /user/assignuserrole endpoint.

🔍 How to Verify

Check if Vulnerable:

Check if your OvalEdge version is 5.2.8.0 or earlier. If so, and you have OE_ADMIN access, test if you can assign arbitrary roles via POST to /user/assignuserrole.

Check Version:

Check the OvalEdge admin interface or configuration files for version information.

Verify Fix Applied:

After patching, verify that the /user/assignuserrole endpoint properly validates role assignments and prevents unauthorized privilege escalation.

📡 Detection & Monitoring

Log Indicators:

  • POST requests to /user/assignuserrole with unusual role parameters
  • Sudden changes in user privileges or role assignments

Network Indicators:

  • HTTP POST traffic to /user/assignuserrole endpoint with role parameter modifications

SIEM Query:

source="ovaledge" AND url="/user/assignuserrole" AND method="POST"

🔗 References

📤 Share & Export