CVE-2024-25632

8.6 HIGH

📋 TL;DR

This vulnerability in eLabFTW allows regular users to escalate privileges to administrator within teams where they are members. In versions after v5.0.0, it may also allow unauthenticated users to gain administrative privileges over arbitrary teams. This affects all eLabFTW instances with vulnerable configurations.

💻 Affected Systems

Products:
  • eLabFTW
Versions: Versions prior to 5.1.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability affects reasonable configurations where users can be administrators in some teams and regular users in others. Post-v5.0.0 versions have additional unauthenticated attack vector.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An unauthenticated attacker gains administrative control over any team, allowing them to modify user permissions, delete/alter research data, and potentially access sensitive information across the entire instance.

🟠

Likely Case

Regular users within teams escalate to administrator privileges, enabling unauthorized management of team members and content within their assigned teams.

🟢

If Mitigated

With proper controls (disabled user registration, restricted imports), only authenticated team members could potentially escalate privileges within their existing teams.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The advisory suggests exploitation is straightforward under reasonable configurations. Unauthenticated exploitation is possible in versions after v5.0.0.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.1.0

Vendor Advisory: https://github.com/elabftw/elabftw/security/advisories/GHSA-6m7p-gh9f-5mgg

Restart Required: Yes

Instructions:

1. Backup your eLabFTW instance and database. 2. Download eLabFTW version 5.1.0 or later. 3. Replace existing installation files with new version. 4. Run database update scripts if required. 5. Restart web server services.

🔧 Temporary Workarounds

Disable user registration and imports

all

Turn off local user registration, disable saml_team_create, and prevent administrators from importing users into teams

Configure in eLabFTW admin panel or configuration files

🧯 If You Can't Patch

  • Disable local user registration completely
  • Restrict administrator permissions to import users into teams

🔍 How to Verify

Check if Vulnerable:

Check eLabFTW version via admin panel or by examining the software files. Versions below 5.1.0 are vulnerable.

Check Version:

Check eLabFTW admin panel or examine src/defines.php for version constant

Verify Fix Applied:

Confirm version is 5.1.0 or higher via admin panel or version file. Test user privilege escalation attempts should fail.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected privilege escalation events
  • User role changes from regular to admin
  • Unauthorized access attempts to admin functions

Network Indicators:

  • Unusual API calls to user permission endpoints
  • Suspicious authentication patterns

SIEM Query:

Search for user role changes from 'user' to 'admin' within short timeframes, especially for users with existing team memberships

🔗 References

📤 Share & Export