CVE-2024-27292

7.5 HIGH

📋 TL;DR

This vulnerability in Docassemble allows attackers to access sensitive information through URL manipulation. It affects versions 1.4.53 to 1.4.96 of the Docassemble expert system. Attackers can exploit this flaw to view unauthorized data without proper authentication.

💻 Affected Systems

Products:
  • Docassemble
Versions: 1.4.53 to 1.4.96
Operating Systems: All platforms running Docassemble
Default Config Vulnerable: ⚠️ Yes
Notes: All installations within the affected version range are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of sensitive user data, legal documents, and confidential information stored in the system, potentially leading to data breaches and regulatory violations.

🟠

Likely Case

Unauthorized access to specific documents or user information through crafted URLs, resulting in data exposure and privacy violations.

🟢

If Mitigated

Limited exposure of non-critical information if proper access controls and network segmentation are implemented alongside the patch.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The advisory indicates URL manipulation is sufficient for exploitation, suggesting low technical barrier.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.4.97

Vendor Advisory: https://github.com/jhpyle/docassemble/security/advisories/GHSA-jq57-3w7p-vwvv

Restart Required: Yes

Instructions:

1. Backup your Docassemble installation and data
2. Update to version 1.4.97 or later using: pip install --upgrade docassemble==1.4.97
3. Restart the Docassemble service
4. Verify the update was successful

🔧 Temporary Workarounds

Network Access Restriction

linux

Restrict network access to Docassemble instances to only trusted users and networks

Use firewall rules to limit access: iptables -A INPUT -p tcp --dport 80 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP

Web Application Firewall

all

Implement WAF rules to detect and block URL manipulation attempts

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Docassemble instances from untrusted networks
  • Deploy additional authentication layers and monitor for unusual URL access patterns

🔍 How to Verify

Check if Vulnerable:

Check your Docassemble version. If it's between 1.4.53 and 1.4.96 inclusive, you are vulnerable.

Check Version:

python -c "import docassemble; print(docassemble.__version__)"

Verify Fix Applied:

After updating, verify the version is 1.4.97 or higher and test that URL manipulation no longer exposes unauthorized information.

📡 Detection & Monitoring

Log Indicators:

  • Unusual URL patterns with parameter manipulation
  • Access attempts to unauthorized endpoints
  • Multiple failed access attempts followed by successful data retrieval

Network Indicators:

  • HTTP requests with manipulated query parameters or paths
  • Unusual traffic patterns to document endpoints

SIEM Query:

source="docassemble_logs" AND (url="*?*" OR url="*/..*" OR status=200 AND user="anonymous")

🔗 References

📤 Share & Export