CVE-2024-46624

8.8 HIGH

📋 TL;DR

This vulnerability in InfoDom Performa 365 allows authenticated attackers to escalate their privileges to Administrator by sending a crafted payload to the /api/users endpoint. It affects organizations using InfoDom Performa 365 version 4.0.1 with authenticated user accounts.

💻 Affected Systems

Products:
  • InfoDom Performa 365
Versions: v4.0.1
Operating Systems: Not OS-specific
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the application. All deployments of version 4.0.1 are vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full administrative control over the system, allowing them to access sensitive data, modify configurations, create new accounts, and potentially compromise the entire environment.

🟠

Likely Case

Malicious insiders or compromised accounts exploit the vulnerability to gain administrative privileges, leading to unauthorized data access and system manipulation.

🟢

If Mitigated

With proper network segmentation and monitoring, impact is limited to the affected application instance with detection of privilege escalation attempts.

🌐 Internet-Facing: HIGH if the application is exposed to the internet with authenticated user access.
🏢 Internal Only: HIGH as authenticated users can exploit this from within the network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access and crafting specific payloads to the API endpoint. The GitHub reference contains research details but not a full exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 4.0.1 (check vendor for specific version)

Vendor Advisory: Not provided in references

Restart Required: No

Instructions:

1. Contact InfoDom for the latest patched version. 2. Backup current configuration. 3. Apply the vendor-provided patch or upgrade to a fixed version. 4. Test functionality after patching.

🔧 Temporary Workarounds

API Endpoint Restriction

all

Restrict access to the /api/users endpoint to only administrative IP addresses or network segments.

Web Application Firewall Rules

all

Implement WAF rules to block suspicious requests to /api/users containing privilege escalation patterns.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the Performa 365 application from sensitive systems
  • Enhance monitoring of /api/users endpoint access and privilege changes in audit logs

🔍 How to Verify

Check if Vulnerable:

Check if running InfoDom Performa 365 version 4.0.1. Review application logs for unauthorized access to /api/users endpoint.

Check Version:

Check application admin interface or configuration files for version information

Verify Fix Applied:

Verify the application version is updated beyond 4.0.1. Test that authenticated non-admin users cannot escalate privileges via /api/users.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /api/users from non-admin accounts
  • User privilege changes from regular to administrator

Network Indicators:

  • HTTP requests to /api/users with crafted payload patterns
  • Unusual API traffic from authenticated sessions

SIEM Query:

source="performa_logs" AND (uri_path="/api/users" AND http_method="POST") AND user_role!="admin"

🔗 References

📤 Share & Export