CVE-2024-45786

6.5 MEDIUM

📋 TL;DR

This vulnerability in Reedos aiM-Star version 2.0.1 allows authenticated attackers to bypass access controls on certain API endpoints by manipulating URL parameters. Successful exploitation enables unauthorized access to other users' sensitive information. Only users of Reedos aiM-Star version 2.0.1 are affected.

💻 Affected Systems

Products:
  • Reedos aiM-Star
Versions: 2.0.1
Operating Systems: Any OS running aiM-Star
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects version 2.0.1; requires authenticated access to exploit

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access all sensitive user data including personal information, credentials, and proprietary business data, potentially leading to data breaches, identity theft, and regulatory violations.

🟠

Likely Case

Attackers access limited sensitive information from other users they shouldn't have permission to view, potentially exposing personal data or business information.

🟢

If Mitigated

With proper access controls and input validation, attackers would be prevented from accessing unauthorized data, limiting impact to attempted access logs.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated access but exploitation appears straightforward through parameter manipulation

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor for updated version

Vendor Advisory: https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0291

Restart Required: Yes

Instructions:

1. Check vendor advisory for patch availability 2. Backup current installation 3. Apply vendor-provided patch 4. Restart aiM-Star service 5. Verify fix implementation

🔧 Temporary Workarounds

API Endpoint Restriction

all

Temporarily restrict access to vulnerable API endpoints using web server or firewall rules

# Example for nginx: location ~ ^/api/vulnerable-endpoint { deny all; }
# Example for Apache: <Location "/api/vulnerable-endpoint"> Require all denied </Location>

Enhanced Authentication Monitoring

all

Implement strict authentication logging and alerting for suspicious API access patterns

# Configure application logging for all API access
# Set up alerts for unusual parameter patterns in API requests

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate aiM-Star from sensitive data stores
  • Deploy web application firewall with rules to detect and block parameter manipulation attempts

🔍 How to Verify

Check if Vulnerable:

Review API endpoint access controls and test parameter manipulation with authenticated sessions

Check Version:

Check aiM-Star admin interface or configuration files for version information

Verify Fix Applied:

Test that parameter manipulation no longer allows access to unauthorized user data

📡 Detection & Monitoring

Log Indicators:

  • Unusual API parameter patterns
  • Access to user data outside normal patterns
  • Failed authorization attempts on sensitive endpoints

Network Indicators:

  • Unusual API request patterns with manipulated parameters
  • High volume of requests to sensitive endpoints

SIEM Query:

source="aim-star" AND (event_type="api_access" AND (parameter_manipulation="true" OR user_id_mismatch="true"))

🔗 References

📤 Share & Export