CVE-2023-31062

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers with valid unprivileged accounts to escalate privileges in Apache InLong. By intercepting login requests and reusing session cookies in subsequent HTTP requests, attackers can bypass intended access controls. This affects all Apache InLong deployments running versions 1.2.0 through 1.6.0.

💻 Affected Systems

Products:
  • Apache InLong
Versions: 1.2.0 through 1.6.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations of affected versions are vulnerable. The vulnerability requires an attacker to have a valid account, even with minimal privileges.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise where attackers gain administrative privileges, potentially leading to data theft, service disruption, or deployment of additional malware.

🟠

Likely Case

Unauthorized access to sensitive data and administrative functions, allowing attackers to modify configurations, access user data, or disrupt services.

🟢

If Mitigated

Limited impact if proper network segmentation and least privilege principles are enforced, though attackers could still access data within their assigned privilege level.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires a valid account but is straightforward using tools like Burp Suite. The technique involves session cookie manipulation after authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.7.0

Vendor Advisory: https://lists.apache.org/thread/btorjbo9o71h22tcvxzy076022hjdzq0

Restart Required: Yes

Instructions:

1. Backup current configuration and data. 2. Download Apache InLong 1.7.0 from official sources. 3. Stop the InLong service. 4. Replace with version 1.7.0. 5. Restart the service. 6. Verify functionality.

🔧 Temporary Workarounds

Network Access Restriction

linux

Restrict access to InLong management interfaces to trusted IP addresses only

# Use firewall rules to restrict access
# Example for iptables:
iptables -A INPUT -p tcp --dport [INLONG_PORT] -s [TRUSTED_IP] -j ACCEPT
iptables -A INPUT -p tcp --dport [INLONG_PORT] -j DROP

Account Management Controls

all

Implement strict account management and monitoring for suspicious activity

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate InLong instances from critical systems
  • Enable detailed logging and monitoring for privilege escalation attempts and unusual account activity

🔍 How to Verify

Check if Vulnerable:

Check the InLong version. If it's between 1.2.0 and 1.6.0 inclusive, the system is vulnerable.

Check Version:

Check the InLong web interface or configuration files for version information, or run: curl -s http://[INLONG_HOST]:[PORT]/api/info | grep version

Verify Fix Applied:

Verify the version is 1.7.0 or higher and test that session cookies cannot be reused for privilege escalation.

📡 Detection & Monitoring

Log Indicators:

  • Multiple privilege escalation attempts from single accounts
  • Unusual administrative actions from non-admin accounts
  • Session cookie reuse patterns

Network Indicators:

  • HTTP requests with manipulated session cookies
  • Burp Suite or similar proxy traffic to InLong endpoints

SIEM Query:

source="inlong" AND (event_type="privilege_escalation" OR user_role_change OR admin_action FROM non_admin_user)

🔗 References

📤 Share & Export