CVE-2024-37767

7.5 HIGH

📋 TL;DR

This vulnerability allows attackers to access all user information in 14Finger v1.1 through insecure permissions in the /api/admin/user component. Attackers can exploit this by sending a crafted GET request without proper authentication. Any organization using the vulnerable version of 14Finger is affected.

💻 Affected Systems

Products:
  • 14Finger
Versions: v1.1
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default configuration of the affected version.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all user data including usernames, emails, and potentially sensitive information, leading to data breach, identity theft, or credential harvesting attacks.

🟠

Likely Case

Unauthorized access to user information enabling reconnaissance, targeted attacks, or data exfiltration.

🟢

If Mitigated

Limited or no impact if proper access controls, network segmentation, and authentication mechanisms are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The exploit requires only a crafted GET request to the vulnerable endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://github.com/b1ackc4t/14Finger/issues/12

Restart Required: No

Instructions:

Check the GitHub repository for updates. If no patch is available, consider implementing workarounds or migrating to a different solution.

🔧 Temporary Workarounds

Restrict API Access

all

Implement access controls to restrict access to the /api/admin/user endpoint to authorized users only.

# Example using web server config (nginx)
location /api/admin/user {
    deny all;
    # Or implement proper authentication
}

Network Segmentation

linux

Restrict network access to the 14Finger instance to trusted IP addresses only.

# Example using iptables
sudo iptables -A INPUT -p tcp --dport [14Finger_PORT] -s [TRUSTED_IP] -j ACCEPT
sudo iptables -A INPUT -p tcp --dport [14Finger_PORT] -j DROP

🧯 If You Can't Patch

  • Implement strict network access controls to limit exposure.
  • Monitor logs for unauthorized access attempts to the vulnerable endpoint.

🔍 How to Verify

Check if Vulnerable:

Send a GET request to /api/admin/user endpoint and check if it returns user information without authentication.

Check Version:

Check the application version in the web interface or configuration files.

Verify Fix Applied:

After implementing controls, verify that unauthorized requests to /api/admin/user are blocked or return appropriate error responses.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized GET requests to /api/admin/user endpoint
  • Multiple failed authentication attempts followed by successful access

Network Indicators:

  • Unusual traffic patterns to the /api/admin/user endpoint
  • Requests from unexpected IP addresses

SIEM Query:

source="web_server_logs" AND uri="/api/admin/user" AND response_code=200 AND NOT user_agent="authorized_client"

🔗 References

📤 Share & Export