CVE-2022-47714

9.8 CRITICAL

📋 TL;DR

CVE-2022-47714 is a missing HSTS (HTTP Strict Transport Security) header vulnerability in Last Yard version 22.09.8-1 that allows attackers to perform man-in-the-middle attacks and downgrade HTTPS connections to HTTP. This affects all users of Last Yard 22.09.8-1 who access the application over networks where traffic can be intercepted.

💻 Affected Systems

Products:
  • Last Yard
Versions: 22.09.8-1
Operating Systems: All platforms running Last Yard
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments of Last Yard 22.09.8-1 are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers intercept sensitive data (credentials, session tokens, confidential information) through SSL stripping attacks, leading to complete account compromise and data exfiltration.

🟠

Likely Case

Session hijacking and credential theft when users access the application over untrusted networks like public Wi-Fi.

🟢

If Mitigated

Limited impact if users only access via trusted networks with proper network segmentation and monitoring.

🌐 Internet-Facing: HIGH - Internet-facing instances are vulnerable to network-based attacks from any location.
🏢 Internal Only: MEDIUM - Internal instances are vulnerable to insider threats or compromised internal systems.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to intercept traffic but no authentication to the target system.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 22.09.8-1

Vendor Advisory: https://github.com/l00neyhacker/CVE-2022-47714

Restart Required: Yes

Instructions:

1. Update Last Yard to version after 22.09.8-1. 2. Restart the Last Yard service. 3. Verify HSTS headers are present in HTTP responses.

🔧 Temporary Workarounds

Configure HSTS headers via reverse proxy

all

Add HSTS headers at the reverse proxy/load balancer level before requests reach Last Yard

For nginx: add_header Strict-Transport-Security "max-age=31536000; includeSubDomains" always;
For Apache: Header always set Strict-Transport-Security "max-age=31536000; includeSubDomains"

🧯 If You Can't Patch

  • Deploy network-level SSL inspection and monitoring to detect SSL stripping attempts
  • Implement certificate pinning at client applications accessing Last Yard

🔍 How to Verify

Check if Vulnerable:

Use curl or browser developer tools to check HTTP responses: curl -I https://last-yard-url/ and verify absence of 'Strict-Transport-Security' header

Check Version:

Check Last Yard version in admin interface or configuration files

Verify Fix Applied:

Check HTTP responses contain: Strict-Transport-Security: max-age=31536000; includeSubDomains

📡 Detection & Monitoring

Log Indicators:

  • Multiple HTTP requests to same resources that should be HTTPS
  • User sessions originating from HTTP instead of HTTPS

Network Indicators:

  • HTTP traffic to Last Yard endpoints that should only use HTTPS
  • SSL stripping tool signatures in network traffic

SIEM Query:

source="last-yard-logs" AND (protocol="http" AND (uri CONTAINS "/login" OR uri CONTAINS "/api"))

🔗 References

📤 Share & Export