CVE-2024-50672

9.8 CRITICAL

📋 TL;DR

This NoSQL injection vulnerability in Adapt Learning Authoring Tool allows unauthenticated attackers to reset any user's password, including administrators. Successful exploitation enables full account takeover and potential remote code execution via plugin upload. All systems running Adapt Authoring Tool version 0.11.3 or earlier are affected.

💻 Affected Systems

Products:
  • Adapt Learning Adapt Authoring Tool
Versions: <= 0.11.3
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the password reset functionality which is typically enabled by default.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via administrator account takeover leading to remote code execution, data theft, and potential lateral movement within the network.

🟠

Likely Case

Administrator account compromise leading to unauthorized access, data manipulation, and potential malware deployment via plugin upload.

🟢

If Mitigated

Limited impact if proper input validation and authentication controls are in place, though the vulnerability still exists.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept code is available, making exploitation straightforward for attackers with basic skills.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: > 0.11.3

Vendor Advisory: https://github.com/adaptlearning/adapt_authoring

Restart Required: Yes

Instructions:

1. Update to the latest version of Adapt Authoring Tool. 2. Restart the application service. 3. Verify the update was successful.

🔧 Temporary Workarounds

Disable Password Reset Feature

all

Temporarily disable the password reset functionality until patching is complete.

Modify application configuration to disable password reset endpoint

Network Access Control

all

Restrict access to the Adapt Authoring Tool to trusted IP addresses only.

Configure firewall rules to limit access to specific IP ranges

🧯 If You Can't Patch

  • Implement a web application firewall (WAF) with NoSQL injection protection rules
  • Monitor for suspicious password reset attempts and implement rate limiting

🔍 How to Verify

Check if Vulnerable:

Check the Adapt Authoring Tool version. If it's 0.11.3 or earlier, the system is vulnerable.

Check Version:

Check the package.json file or application configuration for version information

Verify Fix Applied:

Verify the version is greater than 0.11.3 and test the password reset functionality with safe test inputs.

📡 Detection & Monitoring

Log Indicators:

  • Unusual password reset requests, especially for administrator accounts
  • Multiple failed login attempts followed by successful password reset

Network Indicators:

  • Unusual traffic patterns to password reset endpoints
  • Requests containing NoSQL injection patterns in query parameters

SIEM Query:

source="adapt_authoring" AND (event="password_reset" OR uri_path="/api/user/reset")

🔗 References

📤 Share & Export