CVE-2024-36108

9.8 CRITICAL

📋 TL;DR

CVE-2024-36108 is an authorization bypass vulnerability in casgate identity management system that allows unauthenticated attackers to access sensitive API endpoints by using 'anonymous/ anonymous' as the id parameter. This affects all casgate users running vulnerable versions, potentially leading to account takeover and privilege escalation. The vulnerability has a CVSS score of 9.8, indicating critical severity.

💻 Affected Systems

Products:
  • casgate
Versions: All versions before the fix in PR #201
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all casgate deployments with vulnerable versions, regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise including account takeover, privilege escalation to administrative roles, and credential theft for connected services.

🟠

Likely Case

Unauthorized access to sensitive user data, potential account takeover of regular users, and exposure of authentication credentials.

🟢

If Mitigated

Limited impact if proper network segmentation and API gateway controls are in place, but still represents significant authentication bypass risk.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only a simple HTTP GET request with specific parameter values, making it trivial for attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version containing PR #201 fix

Vendor Advisory: https://github.com/casgate/casgate/security/advisories/GHSA-mj5q-rc67-h56c

Restart Required: Yes

Instructions:

1. Monitor casgate repository for release containing PR #201. 2. Upgrade to patched version. 3. Restart casgate service. 4. Verify fix is applied.

🔧 Temporary Workarounds

API Endpoint Restriction

all

Implement web application firewall rules or API gateway restrictions to block requests with 'anonymous/ anonymous' parameter values.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate casgate from internet and restrict access to trusted IPs only.
  • Deploy web application firewall with custom rules to detect and block exploitation attempts.

🔍 How to Verify

Check if Vulnerable:

Test by sending GET request to casgate API endpoints with id parameter set to 'anonymous/ anonymous' and check if unauthorized access is granted.

Check Version:

Check casgate version through admin interface or application logs.

Verify Fix Applied:

After patching, repeat the same test and verify that proper authorization is enforced and access is denied.

📡 Detection & Monitoring

Log Indicators:

  • HTTP GET requests with 'anonymous/ anonymous' in id parameter
  • Unauthorized access attempts to sensitive API endpoints
  • Unusual authentication patterns from single IPs

Network Indicators:

  • Unusual volume of GET requests to casgate API endpoints
  • Requests containing 'anonymous/ anonymous' parameter values

SIEM Query:

source="casgate" AND (http_method="GET" AND uri_query CONTAINS "anonymous/ anonymous")

🔗 References

📤 Share & Export