CVE-2024-51037

5.3 MEDIUM

📋 TL;DR

This vulnerability in kodbox v1.52.04 and earlier allows remote attackers to obtain sensitive information through the captcha feature in the password reset function. Attackers can exploit this to potentially access user data or system information. All users running affected versions of kodbox are impacted.

💻 Affected Systems

Products:
  • kodbox
Versions: v1.52.04 and earlier
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All installations with password reset functionality enabled are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could obtain sensitive user information, potentially leading to account compromise, data breaches, or further system exploitation.

🟠

Likely Case

Attackers can access limited sensitive information through the password reset captcha, potentially enabling targeted attacks or information gathering.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to information disclosure that may not directly lead to system compromise.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to the kodbox instance but no authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v1.52.05 or later

Vendor Advisory: https://github.com/kalcaddle/kodbox

Restart Required: Yes

Instructions:

1. Backup current installation. 2. Download latest version from official repository. 3. Replace affected files. 4. Restart web server/service.

🔧 Temporary Workarounds

Disable Password Reset

all

Temporarily disable password reset functionality to prevent exploitation

Modify kodbox configuration to disable password reset feature

Implement Rate Limiting

all

Add rate limiting to captcha requests to reduce attack surface

Configure web server or application firewall to limit requests to /index.php?user/passwordReset

🧯 If You Can't Patch

  • Implement network segmentation to restrict access to kodbox instance
  • Deploy WAF rules to block suspicious captcha requests

🔍 How to Verify

Check if Vulnerable:

Check kodbox version in admin panel or by examining version files

Check Version:

Check /system/version.php or admin panel version display

Verify Fix Applied:

Verify version is v1.52.05 or later and test password reset functionality

📡 Detection & Monitoring

Log Indicators:

  • Unusual volume of password reset requests
  • Multiple failed captcha attempts from single IP

Network Indicators:

  • Excessive requests to password reset endpoint
  • Patterns of captcha-related traffic

SIEM Query:

source="kodbox" AND (uri="*passwordReset*" OR uri="*captcha*") AND count > threshold

🔗 References

📤 Share & Export