CVE-2024-39033

7.5 HIGH

📋 TL;DR

This CVE describes an Insecure Direct Object Reference (IDOR) vulnerability in Newgensoft OmniDocs that allows attackers to access other users' configuration data and personally identifiable information (PII) by manipulating object references. The vulnerability affects organizations using OmniDocs 11.0_SP1_03_006 for document management and workflow automation.

💻 Affected Systems

Products:
  • Newgensoft OmniDocs
Versions: 11.0_SP1_03_006
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments of the affected version are vulnerable unless specifically hardened.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Mass data breach exposing all user PII and configuration data, leading to identity theft, regulatory fines, and reputational damage.

🟠

Likely Case

Targeted data theft of specific users' sensitive information and configuration settings.

🟢

If Mitigated

Limited exposure if proper access controls and input validation are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access but minimal technical skill to manipulate object identifiers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 11.0_SP1_03_007 or later

Vendor Advisory: https://www.newgensoft.com/advisories/

Restart Required: No

Instructions:

1. Contact Newgensoft support for patch 11.0_SP1_03_007. 2. Apply patch following vendor instructions. 3. Test functionality after patching.

🔧 Temporary Workarounds

Implement Access Control Validation

all

Add server-side authorization checks in the getuserproperty function to verify user permissions before returning data.

Modify application code to include user permission validation in getuserproperty function

🧯 If You Can't Patch

  • Implement network segmentation to restrict access to OmniDocs servers
  • Enable detailed logging and monitoring of getuserproperty function calls

🔍 How to Verify

Check if Vulnerable:

Test if manipulating user ID parameters in getuserproperty requests returns unauthorized user data.

Check Version:

Check OmniDocs version in administration console or via vendor-provided version check utility.

Verify Fix Applied:

Verify that getuserproperty function now properly validates user permissions and returns 403 for unauthorized requests.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authorization attempts on getuserproperty
  • Unusual patterns of getuserproperty requests from single IP

Network Indicators:

  • HTTP requests to getuserproperty with manipulated user ID parameters

SIEM Query:

source="omni*" AND (uri="*getuserproperty*" AND status=200) | stats count by src_ip, user_id

🔗 References

📤 Share & Export