CVE-2024-27712
📋 TL;DR
This vulnerability in Eskooly Free Online School Management Software allows remote attackers to escalate privileges through the User Account Management component due to broken authentication. It affects all versions up to and including v3.0, enabling unauthorized access to administrative functions.
💻 Affected Systems
- Eskooly Free Online School Management Software
📦 What is this software?
Eskooly by Eskooly
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise where attackers gain administrative privileges, access sensitive student/teacher data, modify system configurations, and potentially deploy ransomware or other malware.
Likely Case
Attackers gain elevated privileges to access confidential student records, modify grades, alter user permissions, and potentially pivot to other systems in the network.
If Mitigated
Limited impact with proper network segmentation, strong authentication controls, and monitoring that detects privilege escalation attempts.
🎯 Exploit Status
The vulnerability involves user enumeration via account settings, suggesting relatively straightforward exploitation once initial access is obtained.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: No vendor advisory found in provided references
Restart Required: No
Instructions:
1. Check Eskooly vendor website for security updates
2. Upgrade to version above v3.0 if available
3. Apply any security patches provided by Eskooly
4. Test in non-production environment first
🔧 Temporary Workarounds
Network Segmentation
allIsolate Eskooly instance from internet and restrict access to authorized IPs only
Enhanced Authentication Controls
allImplement multi-factor authentication and strong password policies for all user accounts
🧯 If You Can't Patch
- Implement web application firewall (WAF) rules to detect and block privilege escalation attempts
- Enable detailed logging and monitoring of all authentication and user management activities
🔍 How to Verify
Check if Vulnerable:
Check Eskooly version in admin panel or configuration files. If version is 3.0 or earlier, assume vulnerable.
Check Version:
Check Eskooly admin dashboard or configuration files for version information
Verify Fix Applied:
Test privilege escalation attempts via User Account Management component after applying any vendor patches.
📡 Detection & Monitoring
Log Indicators:
- Unusual user privilege changes
- Multiple failed authentication attempts followed by successful privilege escalation
- Access to admin functions from non-admin accounts
Network Indicators:
- Unusual patterns of requests to user management endpoints
- Traffic to account settings from unexpected IP addresses
SIEM Query:
source="eskooly_logs" AND (event_type="privilege_change" OR event_type="user_enumeration")
🔗 References
- https://blog.be-hacktive.com/eskooly-cve/eskooly-broken-authentication/cve-2024-27712-user-enumeration-via-account-settings-in-eskooly-web-product-less-than-v3.0
- https://blog.be-hacktive.com/eskooly-cve/eskooly-broken-authentication/cve-2024-27712-user-enumeration-via-account-settings-in-eskooly-web-product-less-than-v3.0