CVE-2024-27292
📋 TL;DR
This vulnerability in Docassemble allows attackers to access sensitive information through URL manipulation. It affects versions 1.4.53 to 1.4.96 of the Docassemble expert system. Attackers can exploit this flaw to view unauthorized data without proper authentication.
💻 Affected Systems
- Docassemble
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of sensitive user data, legal documents, and confidential information stored in the system, potentially leading to data breaches and regulatory violations.
Likely Case
Unauthorized access to specific documents or user information through crafted URLs, resulting in data exposure and privacy violations.
If Mitigated
Limited exposure of non-critical information if proper access controls and network segmentation are implemented alongside the patch.
🎯 Exploit Status
The advisory indicates URL manipulation is sufficient for exploitation, suggesting low technical barrier.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.4.97
Vendor Advisory: https://github.com/jhpyle/docassemble/security/advisories/GHSA-jq57-3w7p-vwvv
Restart Required: Yes
Instructions:
1. Backup your Docassemble installation and data
2. Update to version 1.4.97 or later using: pip install --upgrade docassemble==1.4.97
3. Restart the Docassemble service
4. Verify the update was successful
🔧 Temporary Workarounds
Network Access Restriction
linuxRestrict network access to Docassemble instances to only trusted users and networks
Use firewall rules to limit access: iptables -A INPUT -p tcp --dport 80 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP
Web Application Firewall
allImplement WAF rules to detect and block URL manipulation attempts
🧯 If You Can't Patch
- Implement strict network segmentation to isolate Docassemble instances from untrusted networks
- Deploy additional authentication layers and monitor for unusual URL access patterns
🔍 How to Verify
Check if Vulnerable:
Check your Docassemble version. If it's between 1.4.53 and 1.4.96 inclusive, you are vulnerable.
Check Version:
python -c "import docassemble; print(docassemble.__version__)"
Verify Fix Applied:
After updating, verify the version is 1.4.97 or higher and test that URL manipulation no longer exposes unauthorized information.
📡 Detection & Monitoring
Log Indicators:
- Unusual URL patterns with parameter manipulation
- Access attempts to unauthorized endpoints
- Multiple failed access attempts followed by successful data retrieval
Network Indicators:
- HTTP requests with manipulated query parameters or paths
- Unusual traffic patterns to document endpoints
SIEM Query:
source="docassemble_logs" AND (url="*?*" OR url="*/..*" OR status=200 AND user="anonymous")
🔗 References
- https://github.com/jhpyle/docassemble/commit/97f77dc486a26a22ba804765bfd7058aabd600c9
- https://github.com/jhpyle/docassemble/security/advisories/GHSA-jq57-3w7p-vwvv
- https://github.com/jhpyle/docassemble/commit/97f77dc486a26a22ba804765bfd7058aabd600c9
- https://github.com/jhpyle/docassemble/security/advisories/GHSA-jq57-3w7p-vwvv