CVE-2024-1006
📋 TL;DR
This critical vulnerability in Shanxi Diankeyun Technology NODERP allows attackers to bypass authentication by manipulating cookie parameters (Nod_User_Id/Nod_User_Token). Remote attackers can potentially gain unauthorized access to affected systems. All users of NODERP up to version 6.0.2 are affected.
💻 Affected Systems
- Shanxi Diankeyun Technology NODERP
📦 What is this software?
Noderp by Shanxi Tianneng Technology
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with administrative access, data theft, and potential lateral movement within the network.
Likely Case
Unauthorized access to sensitive business data, user information, and system functionality leading to data breach.
If Mitigated
Limited impact with proper network segmentation and monitoring, but authentication bypass still possible.
🎯 Exploit Status
Exploit has been publicly disclosed and requires minimal technical skill to execute; remote attack vector.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: None available
Restart Required: No
Instructions:
No official patch available. Vendor was contacted but did not respond. Consider upgrading if vendor releases fixed version.
🔧 Temporary Workarounds
Cookie Validation Enhancement
allImplement server-side validation of Nod_User_Id and Nod_User_Token cookies to prevent manipulation
Modify application/index/common.php to add proper session validation
Web Application Firewall Rules
allBlock or sanitize cookie manipulation attempts at the WAF level
Configure WAF to inspect and block malformed Nod_User_Id/Nod_User_Token cookies
🧯 If You Can't Patch
- Isolate NODERP instances behind network segmentation with strict access controls
- Implement multi-factor authentication and monitor for unusual authentication patterns
🔍 How to Verify
Check if Vulnerable:
Check NODERP version; if ≤6.0.2, examine application/index/common.php for cookie validation weaknesses
Check Version:
Check NODERP admin panel or configuration files for version information
Verify Fix Applied:
Test authentication bypass attempts with manipulated cookies; successful login indicates vulnerability
📡 Detection & Monitoring
Log Indicators:
- Multiple failed login attempts followed by successful login with unusual cookie values
- Authentication logs showing user ID/token mismatches
Network Indicators:
- HTTP requests with manipulated Nod_User_Id/Nod_User_Token cookies
- Unusual authentication patterns from external IPs
SIEM Query:
source="web_logs" AND (cookie="*Nod_User_Id*" OR cookie="*Nod_User_Token*") AND status=200 AND user_agent!="*bot*"