CVE-2024-41517

5.3 MEDIUM

📋 TL;DR

This vulnerability allows remote attackers to access the user privilege management overview page without proper authentication, exposing a list of all users and their permissions in Feripro systems. It affects all Feripro installations running version 2.2.3 or earlier. Attackers can leverage this information for further attacks.

💻 Affected Systems

Products:
  • Feripro
Versions: <= v2.2.3
Operating Systems: All platforms running Feripro
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. The vulnerability exists in the web interface's access control mechanism.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers obtain complete user privilege mapping, enabling targeted privilege escalation attacks, credential stuffing, or social engineering campaigns against specific high-privilege accounts.

🟠

Likely Case

Attackers gather user information to identify administrative accounts and plan targeted attacks, potentially leading to unauthorized access to sensitive administrative functions.

🟢

If Mitigated

With proper network segmentation and access controls, the exposed information would be limited to low-value user data with minimal impact on overall security posture.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability appears to be a simple access control bypass requiring only web requests to the vulnerable endpoint. No authentication is required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v2.2.4 or later

Vendor Advisory: http://feripro.de

Restart Required: Yes

Instructions:

1. Backup your Feripro installation and database. 2. Download the latest version from the official Feripro website. 3. Follow the vendor's upgrade instructions. 4. Restart the Feripro service. 5. Verify the fix by testing access to the vulnerable endpoint.

🔧 Temporary Workarounds

Web Server Access Restriction

all

Block access to the vulnerable endpoint using web server configuration

# For Apache: add to .htaccess or virtual host config
<Location "/admin/benutzer/institution/rechteverwaltung/uebersicht">
    Require all denied
</Location>
# For Nginx: add to server block
location = /admin/benutzer/institution/rechteverwaltung/uebersicht {
    deny all;
    return 403;
}

Network Access Control

linux

Restrict access to Feripro admin interface to trusted IP addresses only

# Example firewall rule (Linux iptables)
iptables -A INPUT -p tcp --dport [FERIPRO_PORT] -s [TRUSTED_IP] -j ACCEPT
iptables -A INPUT -p tcp --dport [FERIPRO_PORT] -j DROP

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Feripro from untrusted networks
  • Deploy a web application firewall (WAF) with rules to block requests to the vulnerable endpoint

🔍 How to Verify

Check if Vulnerable:

Attempt to access http://[feripro-host]/admin/benutzer/institution/rechteverwaltung/uebersicht without authentication. If you receive user privilege data, the system is vulnerable.

Check Version:

Check the Feripro version in the web interface footer or configuration files. The exact command varies by installation.

Verify Fix Applied:

After patching, attempt the same access test. You should receive an authentication prompt or access denied error instead of user data.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to /admin/benutzer/institution/rechteverwaltung/uebersicht from unauthorized IPs
  • Multiple failed authentication attempts followed by successful access to the vulnerable endpoint

Network Indicators:

  • HTTP GET requests to the vulnerable endpoint without preceding authentication requests
  • Traffic from unexpected sources to Feripro admin interfaces

SIEM Query:

source="feripro_access.log" AND (uri="/admin/benutzer/institution/rechteverwaltung/uebersicht" AND NOT (user!="-" OR auth_success="true"))

🔗 References

📤 Share & Export