CVE-2024-45919
📋 TL;DR
A privilege escalation vulnerability in Solvait version 24.4.2 allows attackers to bypass approval workflows by manipulating Request ID and Action Type parameters. This enables unauthorized access to sensitive information and fraudulent request approvals. Organizations using the affected Solvait version are impacted.
💻 Affected Systems
- Solvait
📦 What is this software?
Solvait by Solvait
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise through unauthorized privilege escalation, leading to data theft, financial fraud, and operational disruption.
Likely Case
Unauthorized approval of fraudulent requests and access to sensitive business information that should require approval.
If Mitigated
Limited impact with proper network segmentation and monitoring, though vulnerability remains exploitable by authenticated users.
🎯 Exploit Status
Proof of concept available in GitHub gist, requires authenticated access but simple parameter manipulation
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: Unknown
Restart Required: No
Instructions:
Check vendor website for security updates. If patch available, apply following vendor's deployment procedures.
🔧 Temporary Workarounds
Web Application Firewall Rule
allBlock or monitor requests to /AssignToMe/SetAction with unusual parameter patterns
WAF-specific configuration required
Access Restriction
allRestrict access to /AssignToMe/SetAction endpoint to authorized users only
Network ACL or application-level access control configuration
🧯 If You Can't Patch
- Implement strict network segmentation to isolate Solvait systems from sensitive data
- Enable detailed logging and monitoring of all /AssignToMe/SetAction requests for anomalous patterns
🔍 How to Verify
Check if Vulnerable:
Check if running Solvait version 24.4.2 and test /AssignToMe/SetAction endpoint for parameter manipulation vulnerability
Check Version:
Application-specific version check - consult Solvait documentation
Verify Fix Applied:
Verify version is updated beyond 24.4.2 and test that parameter manipulation no longer bypasses approval workflows
📡 Detection & Monitoring
Log Indicators:
- Multiple /AssignToMe/SetAction requests with manipulated Request ID or Action Type parameters
- Unusual approval activity from non-authorized users
Network Indicators:
- HTTP POST requests to /AssignToMe/SetAction with unexpected parameter values
SIEM Query:
source="solvait_logs" AND uri_path="/AssignToMe/SetAction" AND (param.RequestID NOT IN allowed_values OR param.ActionType NOT IN allowed_values)