CVE-2024-12990

4.3 MEDIUM

📋 TL;DR

This vulnerability allows attackers to redirect users to malicious websites by manipulating the 'nexturl' parameter on the admin verification page in Rebuild 3.8.6. It affects all users of the Rebuild software version 3.8.6 who access the admin verification functionality. The vulnerability can be exploited remotely without authentication.

💻 Affected Systems

Products:
  • ruifang-tech Rebuild
Versions: 3.8.6
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with the admin verification page accessible.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could redirect administrators to phishing sites that steal credentials, leading to full system compromise.

🟠

Likely Case

Users are redirected to malicious sites for phishing, malware distribution, or credential harvesting.

🟢

If Mitigated

With proper URL validation and user awareness, impact is limited to inconvenience from unexpected redirects.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit requires crafting a malicious URL with the vulnerable parameter.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Consider upgrading to a newer version if available or implementing workarounds.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement server-side validation to only allow relative URLs or trusted domains in the nexturl parameter.

Modify /user/admin-verify endpoint code to validate nexturl parameter

WAF Rule

all

Add web application firewall rule to block requests with external URLs in the nexturl parameter.

Add WAF rule: Block if nexturl contains http:// or https:// followed by non-localhost domain

🧯 If You Can't Patch

  • Restrict access to the admin verification page using network controls or authentication
  • Implement client-side warnings about external redirects

🔍 How to Verify

Check if Vulnerable:

Test by accessing /user/admin-verify?nexturl=http://evil.example.com and checking if redirect occurs.

Check Version:

Check Rebuild version in application configuration or admin panel.

Verify Fix Applied:

Test the same URL and verify it either blocks the request or redirects to a safe location.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to /user/admin-verify with external URLs in parameters
  • Unusual redirect patterns from admin pages

Network Indicators:

  • Outbound connections to unexpected domains following admin page access

SIEM Query:

source="web_logs" AND uri="/user/admin-verify" AND (param="nexturl" AND value CONTAINS "http")

🔗 References

📤 Share & Export