CVE-2023-26574

7.5 HIGH

📋 TL;DR

CVE-2023-26574 allows unauthenticated attackers to extract sensitive student data from IDAttend's IDWeb application by exploiting missing authentication in the SearchStudents method. This affects organizations using IDWeb version 3.1.052 and earlier for student attendance management.

💻 Affected Systems

Products:
  • IDAttend IDWeb
Versions: 3.1.052 and earlier
Operating Systems: Windows (typical deployment)
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments with the vulnerable version are affected as this is an authentication flaw in the application code.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Mass exfiltration of all student personal data including names, IDs, contact information, and potentially attendance records, leading to privacy violations and regulatory penalties.

🟠

Likely Case

Unauthorized access to student information that could be used for identity theft, social engineering, or harassment.

🟢

If Mitigated

Limited exposure if network segmentation prevents external access, but internal threats remain possible.

🌐 Internet-Facing: HIGH - Unauthenticated remote exploitation allows attackers to access sensitive data without credentials.
🏢 Internal Only: HIGH - Even internally, unauthenticated access to student data violates privacy principles and could be exploited by malicious insiders.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires no authentication and minimal technical skill to exploit via direct API calls or web requests.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.1.053 or later

Vendor Advisory: https://www.themissinglink.com.au/security-advisories/cve-2023-26574

Restart Required: Yes

Instructions:

1. Download latest version from IDAttend vendor portal. 2. Backup current installation. 3. Run installer to upgrade. 4. Restart application services. 5. Verify authentication is required for SearchStudents method.

🔧 Temporary Workarounds

Network Access Control

windows

Restrict access to IDWeb application to authorized IP addresses only

# Example firewall rule (Windows): New-NetFirewallRule -DisplayName "Restrict IDWeb" -Direction Inbound -LocalPort 80,443 -Protocol TCP -Action Allow -RemoteAddress 192.168.1.0/24

Web Application Firewall Rule

all

Block unauthenticated requests to SearchStudents endpoint

# Example ModSecurity rule: SecRule REQUEST_URI "@contains /SearchStudents" "id:1001,phase:1,deny,status:403,msg:'Unauthorized SearchStudents access'"

🧯 If You Can't Patch

  • Implement network segmentation to isolate IDWeb from untrusted networks
  • Deploy a reverse proxy with authentication requirements for all /SearchStudents requests

🔍 How to Verify

Check if Vulnerable:

Attempt to access /SearchStudents endpoint without authentication. If data is returned, system is vulnerable.

Check Version:

Check Help > About in IDWeb interface or examine application files for version information

Verify Fix Applied:

Attempt same unauthenticated access to /SearchStudents endpoint. Should receive authentication error or no data.

📡 Detection & Monitoring

Log Indicators:

  • Multiple unauthenticated requests to /SearchStudents endpoint
  • Unusual data volume from IDWeb application

Network Indicators:

  • HTTP GET/POST requests to /SearchStudents without authentication headers
  • Unusual outbound data transfers from IDWeb server

SIEM Query:

source="idweb.log" AND (uri="/SearchStudents" OR uri CONTAINS "SearchStudents") AND NOT (user!="" OR auth_token EXISTS)

🔗 References

📤 Share & Export