CVE-2024-54450

9.4 CRITICAL

📋 TL;DR

CVE-2024-54450 is an authentication IP spoofing vulnerability in Kurmi Provisioning Suite where attackers can forge the X-Forwarded-For header to make the system record a fake IP address during login. This affects all users of Kurmi Provisioning Suite 7.9.0.33 who rely on accurate IP logging for security monitoring or forensic investigations.

💻 Affected Systems

Products:
  • Kurmi Provisioning Suite
Versions: 7.9.0.33
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all deployments using the vulnerable version regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could spoof IP addresses to evade detection, hide their true location during malicious activities, or frame innocent IP addresses in security incidents.

🟠

Likely Case

Attackers bypass IP-based logging and monitoring systems, making incident response and forensic investigations more difficult by providing false attribution data.

🟢

If Mitigated

With proper header validation and IP verification controls, the impact is limited to inaccurate audit logs without direct system compromise.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires sending a modified HTTP request during authentication but doesn't require special tools or deep technical knowledge.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched version

Vendor Advisory: https://kurmi-software.com/cve/cve-2024-54450/

Restart Required: Yes

Instructions:

1. Review vendor advisory at provided URL
2. Download and apply the official patch from Kurmi
3. Restart the Kurmi Provisioning Suite service
4. Verify the fix by testing with X-Forwarded-For headers

🔧 Temporary Workarounds

Web Server Header Filtering

all

Configure web server (Apache/Nginx/IIS) to strip or validate X-Forwarded-For headers before they reach the Kurmi application

# Apache: mod_headers
RequestHeader unset X-Forwarded-For
# Nginx: proxy_set_header
proxy_set_header X-Forwarded-For $remote_addr;
# IIS: URL Rewrite rule to remove header

Load Balancer/Proxy Configuration

all

Configure upstream proxies or load balancers to properly set X-Forwarded-For headers with trusted IPs only

# Example for common load balancers
# Set to only accept headers from trusted proxy IPs

🧯 If You Can't Patch

  • Implement network-level monitoring for suspicious X-Forwarded-For header patterns
  • Enhance logging to capture both client IP and X-Forwarded-For values for correlation

🔍 How to Verify

Check if Vulnerable:

Test authentication with a crafted X-Forwarded-For header and check if the displayed IP in My Account popup matches the forged header value

Check Version:

Check Kurmi Provisioning Suite version in administration interface or configuration files

Verify Fix Applied:

After patching, repeat the test - the system should now record the actual client IP regardless of X-Forwarded-For header content

📡 Detection & Monitoring

Log Indicators:

  • Discrepancies between client IP and logged authentication IP
  • Multiple successful logins from diverse IP addresses in short timeframes

Network Indicators:

  • HTTP requests with X-Forwarded-For headers containing unusual IP patterns or private addresses

SIEM Query:

source="kurmi_logs" AND (event_type="authentication" AND client_ip != logged_ip)

🔗 References

📤 Share & Export