CVE-2024-27712

9.8 CRITICAL

📋 TL;DR

This vulnerability in Eskooly Free Online School Management Software allows remote attackers to escalate privileges through the User Account Management component due to broken authentication. It affects all versions up to and including v3.0, enabling unauthorized access to administrative functions.

💻 Affected Systems

Products:
  • Eskooly Free Online School Management Software
Versions: All versions up to and including v3.0
Operating Systems: Any OS running the web application
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the web-based interface of Eskooly software. No specific OS requirements mentioned in references.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise where attackers gain administrative privileges, access sensitive student/teacher data, modify system configurations, and potentially deploy ransomware or other malware.

🟠

Likely Case

Attackers gain elevated privileges to access confidential student records, modify grades, alter user permissions, and potentially pivot to other systems in the network.

🟢

If Mitigated

Limited impact with proper network segmentation, strong authentication controls, and monitoring that detects privilege escalation attempts.

🌐 Internet-Facing: HIGH - The vulnerability affects web-based software that is typically exposed to the internet for remote access by schools and administrators.
🏢 Internal Only: MEDIUM - While primarily internet-facing, internal attackers could also exploit this if they have network access to the Eskooly instance.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

The vulnerability involves user enumeration via account settings, suggesting relatively straightforward exploitation once initial access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: No vendor advisory found in provided references

Restart Required: No

Instructions:

1. Check Eskooly vendor website for security updates
2. Upgrade to version above v3.0 if available
3. Apply any security patches provided by Eskooly
4. Test in non-production environment first

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Eskooly instance from internet and restrict access to authorized IPs only

Enhanced Authentication Controls

all

Implement multi-factor authentication and strong password policies for all user accounts

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to detect and block privilege escalation attempts
  • Enable detailed logging and monitoring of all authentication and user management activities

🔍 How to Verify

Check if Vulnerable:

Check Eskooly version in admin panel or configuration files. If version is 3.0 or earlier, assume vulnerable.

Check Version:

Check Eskooly admin dashboard or configuration files for version information

Verify Fix Applied:

Test privilege escalation attempts via User Account Management component after applying any vendor patches.

📡 Detection & Monitoring

Log Indicators:

  • Unusual user privilege changes
  • Multiple failed authentication attempts followed by successful privilege escalation
  • Access to admin functions from non-admin accounts

Network Indicators:

  • Unusual patterns of requests to user management endpoints
  • Traffic to account settings from unexpected IP addresses

SIEM Query:

source="eskooly_logs" AND (event_type="privilege_change" OR event_type="user_enumeration")

🔗 References

📤 Share & Export