CVE-2024-2575
📋 TL;DR
This CVE describes an Insecure Direct Object Reference (IDOR) vulnerability in SourceCodester Employee Task Management System 1.0. Attackers can bypass authorization by manipulating the task_id parameter in /task-details.php, potentially accessing unauthorized task data. The vulnerability affects all deployments of this specific software version.
💻 Affected Systems
- SourceCodester Employee Task Management System
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of task management data including confidential employee assignments, performance reviews, and sensitive business information through unauthorized access to all task records.
Likely Case
Unauthorized viewing and potential modification of task details belonging to other users, leading to data leakage and business process disruption.
If Mitigated
Limited impact with proper access controls and monitoring, potentially only allowing visibility of non-sensitive task metadata.
🎯 Exploit Status
Exploit requires authenticated access but bypasses authorization checks. Public proof-of-concept demonstrates simple parameter manipulation.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: None available
Restart Required: No
Instructions:
No official patch available. Consider implementing proper authorization checks in /task-details.php or migrating to alternative software.
🔧 Temporary Workarounds
Web Application Firewall Rule
allImplement WAF rules to detect and block suspicious task_id parameter manipulation patterns
Access Control Enhancement
allAdd server-side authorization checks in task-details.php to verify user permissions before displaying task data
🧯 If You Can't Patch
- Isolate the system behind additional network segmentation and restrict access to authorized users only
- Implement comprehensive logging and monitoring for unauthorized access attempts to task-details.php
🔍 How to Verify
Check if Vulnerable:
Test by accessing /task-details.php with different task_id values while authenticated as different users to see if authorization bypass occurs
Check Version:
Check application version in admin panel or configuration files
Verify Fix Applied:
Verify that proper authorization checks are implemented by testing with unauthorized task_id values
📡 Detection & Monitoring
Log Indicators:
- Multiple failed authorization attempts on /task-details.php
- Rapid sequential access to different task_id values from same user
Network Indicators:
- Unusual patterns of requests to /task-details.php with varying task_id parameters
SIEM Query:
source="web_logs" AND uri_path="/task-details.php" AND (task_id_changes > threshold OR unauthorized_access_detected)
🔗 References
- https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/IDOR%20-%20task-details.php.md
- https://vuldb.com/?ctiid.257078
- https://vuldb.com/?id.257078
- https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/IDOR%20-%20task-details.php.md
- https://vuldb.com/?ctiid.257078
- https://vuldb.com/?id.257078