CVE-2024-27605

7.5 HIGH

📋 TL;DR

Alldata V0.4.6 has insecure permissions that allow low-privileged users (including test accounts) to query information about all users in the system. This affects any system running Alldata V0.4.6 with default or misconfigured permissions. The vulnerability enables unauthorized information disclosure about user accounts.

💻 Affected Systems

Products:
  • Alldata
Versions: V0.4.6
Operating Systems: All platforms running Alldata
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default configuration where test users or low-privileged accounts have excessive permissions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could enumerate all user accounts, gather usernames, email addresses, and potentially other sensitive user metadata, leading to targeted attacks, credential stuffing, or social engineering campaigns.

🟠

Likely Case

Unauthorized users accessing user lists and account information, potentially enabling reconnaissance for further attacks or violating privacy regulations.

🟢

If Mitigated

Limited to authorized users only accessing their own information, with proper access controls preventing enumeration of other users.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but with low-privileged credentials. The GitHub gist demonstrates the vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None provided in references

Restart Required: No

Instructions:

1. Check for updated versions beyond V0.4.6 from the vendor. 2. If available, upgrade to the patched version. 3. Verify permissions are properly configured after update.

🔧 Temporary Workarounds

Restrict User Query Permissions

all

Modify application permissions to prevent low-privileged users from querying information about other users.

# Configuration changes depend on Alldata's permission system. Review and modify user role permissions to restrict 'user query' or 'user enumeration' capabilities.

Remove or Disable Test Accounts

all

Eliminate test user accounts or restrict their permissions to prevent exploitation.

# Remove test users from the system or modify their permissions to prevent user enumeration queries.

🧯 If You Can't Patch

  • Implement network segmentation to isolate Alldata systems from untrusted networks.
  • Monitor and alert on unusual user enumeration activities in application logs.

🔍 How to Verify

Check if Vulnerable:

Authenticate as a low-privileged user (like 'test') and attempt to query user information through the application's user management interface or API endpoints.

Check Version:

# Check Alldata version through application interface or configuration files. Exact command depends on deployment method.

Verify Fix Applied:

After applying workarounds, attempt the same query with low-privileged accounts and verify access is denied or restricted to authorized information only.

📡 Detection & Monitoring

Log Indicators:

  • Multiple user query requests from low-privileged accounts
  • Unusual patterns of user enumeration activity

Network Indicators:

  • HTTP requests to user enumeration endpoints from unauthorized sources

SIEM Query:

source="alldata_logs" AND (event="user_query" OR endpoint="/api/users") AND user_role="low_privilege" | stats count by src_ip

🔗 References

📤 Share & Export