CVE-2024-41518

7.5 HIGH

📋 TL;DR

An incorrect access control vulnerability in Feripro allows remote attackers to export sensitive registration and participant data via the /admin/programm/<program_id>/export/statistics endpoint without proper authentication. This affects all Feripro installations running version 2.2.3 or earlier.

💻 Affected Systems

Products:
  • Feripro
Versions: <= v2.2.3
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. The vulnerability exists in the web interface's export functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could exfiltrate all registration data including personal identifiable information (PII), potentially violating data protection regulations and exposing sensitive organizational information.

🟠

Likely Case

Unauthorized users accessing and downloading participant lists, registration details, and program statistics that should be restricted to administrators.

🟢

If Mitigated

Proper authentication and authorization checks would prevent unauthorized access, limiting data exposure to legitimate administrators only.

🌐 Internet-Facing: HIGH - The vulnerability allows remote exploitation without authentication, making internet-facing instances particularly vulnerable.
🏢 Internal Only: MEDIUM - Internal instances are still vulnerable but may have additional network-level protections.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only HTTP requests to the vulnerable endpoint. The vulnerability is documented in public advisories with technical details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v2.2.4 or later

Vendor Advisory: http://feripro.de

Restart Required: Yes

Instructions:

1. Backup your Feripro installation and database. 2. Download the latest version from the official Feripro website. 3. Replace the existing installation files with the updated version. 4. Restart the Feripro service or web server. 5. Verify the fix by testing the export functionality.

🔧 Temporary Workarounds

Web Server Access Restriction

all

Block access to the vulnerable endpoint using web server configuration

# For Apache: RewriteRule ^/admin/programm/.*/export/statistics$ - [F]
# For Nginx: location ~ ^/admin/programm/.*/export/statistics$ { return 403; }

Network Access Control

linux

Restrict access to the Feripro admin interface to trusted IP addresses only

# Firewall rule example: iptables -A INPUT -p tcp --dport 80 -s trusted_ip -j ACCEPT
# iptables -A INPUT -p tcp --dport 80 -j DROP

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Feripro instances from untrusted networks
  • Deploy a web application firewall (WAF) with rules to block unauthorized access to admin export endpoints

🔍 How to Verify

Check if Vulnerable:

Attempt to access http://[feripro-host]/admin/programm/1/export/statistics without authentication. If it returns an XLSX file, the system is vulnerable.

Check Version:

Check the Feripro version in the web interface footer or configuration files

Verify Fix Applied:

After patching, attempt the same unauthorized access. The system should return an authentication error or 403 Forbidden response.

📡 Detection & Monitoring

Log Indicators:

  • HTTP 200 responses to /admin/programm/*/export/statistics from unauthenticated IPs
  • Large file downloads of XLSX files from admin endpoints

Network Indicators:

  • Unusual spikes in traffic to admin export endpoints
  • XLSX file downloads from non-admin IP addresses

SIEM Query:

source="feripro_access.log" AND (uri="/admin/programm/*/export/statistics" AND status=200) AND NOT (user="admin" OR auth_success=true)

🔗 References

📤 Share & Export