CVE-2024-51382

8.4 HIGH

📋 TL;DR

This CSRF vulnerability in JATOS v3.9.3 allows attackers to trick administrators into unknowingly resetting their passwords, leading to complete account takeover. Any JATOS installation running the vulnerable version is affected, particularly those exposed to the internet or used in multi-user environments.

💻 Affected Systems

Products:
  • JATOS (Just Another Tool for Online Studies)
Versions: v3.9.3
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations with administrator accounts. The vulnerability exists in the password reset functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete administrative account takeover leading to full system compromise, data theft, service disruption, and potential lateral movement to connected systems.

🟠

Likely Case

Administrator account hijacking allowing attackers to modify experiments, access sensitive research data, and potentially deploy malicious code.

🟢

If Mitigated

Limited impact with proper CSRF protections and network segmentation, though some risk remains if administrators access malicious content.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires the administrator to be tricked into visiting a malicious webpage while authenticated to JATOS. The Medium article provides technical details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v3.9.4 or later

Vendor Advisory: https://github.com/JATOS/JATOS/releases

Restart Required: Yes

Instructions:

1. Backup your JATOS data and configuration. 2. Download JATOS v3.9.4 or later from GitHub releases. 3. Stop the JATOS service. 4. Replace the JATOS installation with the new version. 5. Restart the JATOS service. 6. Verify the version is updated.

🔧 Temporary Workarounds

CSRF Token Implementation

all

Manually add CSRF tokens to password reset forms if patching isn't immediately possible

Network Segmentation

all

Restrict JATOS admin interface to internal networks only

🧯 If You Can't Patch

  • Implement strict SameSite cookie policies and Content Security Policy headers
  • Require administrators to use separate browser profiles or incognito mode for JATOS access

🔍 How to Verify

Check if Vulnerable:

Check JATOS version via web interface or by examining the installation directory. If version is exactly 3.9.3, it's vulnerable.

Check Version:

Check JATOS web interface footer or examine jatos_version.txt in installation directory

Verify Fix Applied:

After patching, verify version shows 3.9.4 or later. Test password reset functionality with CSRF testing tools.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed login attempts followed by successful password reset
  • Password reset requests from unusual IP addresses or user agents

Network Indicators:

  • HTTP POST requests to /jatos/admin/passwordReset without proper referrer headers
  • Unusual traffic patterns to admin endpoints

SIEM Query:

source="jatos.log" AND ("passwordReset" OR "admin") AND status=200

🔗 References

📤 Share & Export