CVE-2022-30361

5.3 MEDIUM

📋 TL;DR

OvalEdge versions 5.2.8.0 and earlier expose sensitive user information through an unauthenticated GET request to /user/getUserType. This vulnerability allows attackers to retrieve personal details including email addresses, roles, and user preferences without requiring any authentication. All organizations running affected OvalEdge versions are at risk.

💻 Affected Systems

Products:
  • OvalEdge
Versions: 5.2.8.0 and earlier
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers harvest all user data including email addresses, roles, and personal details, enabling targeted phishing campaigns, credential stuffing attacks, and social engineering against specific high-privilege users.

🟠

Likely Case

Attackers collect user information to build targeted attack profiles, potentially leading to credential theft, account takeover attempts, and reconnaissance for further attacks.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to internal reconnaissance only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP GET request to vulnerable endpoint with no authentication required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.2.8.1 or later

Vendor Advisory: https://cve.offsecguy.com/ovaledge/vulnerabilities/sensitive-data-exposure#cve-2022-30361

Restart Required: Yes

Instructions:

1. Download latest OvalEdge version from vendor portal. 2. Backup current installation. 3. Apply patch following vendor upgrade guide. 4. Restart OvalEdge services. 5. Verify fix by testing /user/getUserType endpoint.

🔧 Temporary Workarounds

Network Access Control

linux

Restrict access to OvalEdge web interface using firewall rules or network segmentation

iptables -A INPUT -p tcp --dport 8080 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 8080 -j DROP

Web Server Configuration

all

Add authentication requirement to /user/getUserType endpoint

# Add to web server config (Apache example): <Location /user/getUserType> AuthType Basic AuthName "Restricted" Require valid-user </Location>

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate OvalEdge from untrusted networks
  • Deploy WAF with rules to block unauthenticated access to /user/getUserType endpoint

🔍 How to Verify

Check if Vulnerable:

Execute: curl -X GET http://ovaledge-server:port/user/getUserType - if it returns user data without authentication, system is vulnerable

Check Version:

Check OvalEdge admin interface or consult installation documentation for version information

Verify Fix Applied:

Execute same curl command - should return authentication error or no sensitive data

📡 Detection & Monitoring

Log Indicators:

  • Multiple GET requests to /user/getUserType from single IP
  • Unauthenticated access attempts to sensitive endpoints

Network Indicators:

  • HTTP GET requests to /user/getUserType without authentication headers
  • Unusual traffic patterns to user data endpoints

SIEM Query:

source="ovaledge" AND uri="/user/getUserType" AND NOT auth_token=* | stats count by src_ip

🔗 References

📤 Share & Export