CVE-2024-36523

6.5 MEDIUM

📋 TL;DR

An access control vulnerability in Wvp GB28181 Pro 2.0 allows users to maintain access to application data after their accounts (including administrator accounts) have been deleted, as long as they remain logged in. This affects all users of the vulnerable software version who have active sessions when account deletion occurs.

💻 Affected Systems

Products:
  • Wvp GB28181 Pro
Versions: Version 2.0
Operating Systems: All platforms running the software
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments of version 2.0 are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

A deleted administrator could maintain full privileged access indefinitely, potentially accessing sensitive data, modifying configurations, or creating new accounts.

🟠

Likely Case

Users continue accessing their own data after account deletion, leading to data integrity issues and unauthorized access to information that should be inaccessible.

🟢

If Mitigated

With proper session management and access control validation, users would be immediately logged out upon account deletion.

🌐 Internet-Facing: MEDIUM - The vulnerability requires authenticated sessions, but internet-facing instances could be exploited if attackers gain credentials then maintain access after account cleanup.
🏢 Internal Only: MEDIUM - Internal users could maintain unauthorized access after account termination, particularly problematic for former employees or contractors.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires an authenticated session and knowledge that account deletion occurred. No special tools needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://github.com/648540858/wvp-GB28181-pro/issues/1456

Restart Required: No

Instructions:

Check GitHub repository for updates. If patched, update to latest version. No specific patch available as of analysis.

🔧 Temporary Workarounds

Force session termination on account deletion

all

Modify application logic to invalidate all active sessions when an account is deleted

Manual code modification required - implement session cleanup in account deletion function

Implement session timeout

all

Set aggressive session timeouts to limit window of vulnerability

Configure session timeout in application settings (typically in configuration files)

🧯 If You Can't Patch

  • Manually terminate all active sessions after account deletion through administrative interface
  • Implement network-level access controls to restrict access to application for deleted users

🔍 How to Verify

Check if Vulnerable:

1. Create test account and log in. 2. Delete account while maintaining session. 3. Attempt to access application features - if successful, vulnerable.

Check Version:

Check application version in web interface or configuration files

Verify Fix Applied:

Repeat vulnerability test - after account deletion, session should be terminated and access denied.

📡 Detection & Monitoring

Log Indicators:

  • Successful authentication/logins from deleted user accounts
  • Access attempts after account deletion timestamps

Network Indicators:

  • HTTP requests with session cookies for deleted users

SIEM Query:

auth_success AND (user_account_status=deleted OR user_deletion_time < event_time)

🔗 References

📤 Share & Export