CVE-2024-56310

8.8 HIGH

📋 TL;DR

REDCap versions through 14.9.6 have a CSRF vulnerability in Project Dashboards that allows attackers to force user logout by tricking users into clicking malicious dashboard names. This affects all REDCap users with access to Project Dashboards functionality. The vulnerability exists because logout functionality lacks CSRF protections.

💻 Affected Systems

Products:
  • REDCap
Versions: through 14.9.6
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All REDCap installations with Project Dashboards enabled are vulnerable. No special configuration required.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could force mass user logouts across an organization, disrupting research workflows and potentially causing data loss if users were in the middle of data entry.

🟠

Likely Case

Individual users get logged out unexpectedly, causing inconvenience and potential minor workflow disruption.

🟢

If Mitigated

With proper CSRF protections implemented, no unauthorized logout actions can be performed.

🌐 Internet-Facing: HIGH - Publicly accessible REDCap instances are directly vulnerable to this attack from any malicious website.
🏢 Internal Only: MEDIUM - Internal users could still be targeted via phishing emails or compromised internal websites.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user interaction (clicking malicious link) but is technically simple. The GitHub reference contains research details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 14.9.7 or later

Vendor Advisory: https://www.evms.edu/research/resources_services/redcap/redcap_change_log/

Restart Required: No

Instructions:

1. Backup your REDCap installation. 2. Download REDCap version 14.9.7 or later from the official Vanderbilt REDCap website. 3. Follow standard REDCap upgrade procedures. 4. Verify CSRF tokens are now present on logout functionality.

🔧 Temporary Workarounds

CSRF Protection Implementation

all

Manually add CSRF tokens to logout functionality if unable to patch immediately

Requires code modification to REDCap source files. Consult REDCap documentation for CSRF implementation.

Session Validation Enhancement

all

Implement additional session validation checks

Modify session handling to validate logout requests against user context

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to detect and block CSRF attacks targeting logout functionality
  • Educate users about phishing risks and implement click-through warnings for external links

🔍 How to Verify

Check if Vulnerable:

Check if your REDCap version is 14.9.6 or earlier and inspect logout functionality for missing CSRF tokens

Check Version:

Check REDCap Control Center or database version table (redcap_config value for 'redcap_version')

Verify Fix Applied:

After patching, verify that logout requests now include and validate CSRF tokens

📡 Detection & Monitoring

Log Indicators:

  • Multiple unexpected logout events from same IP
  • Logout requests without corresponding user actions

Network Indicators:

  • HTTP POST requests to logout endpoint without Referer header validation
  • Suspicious redirect patterns

SIEM Query:

source="redcap_logs" AND (event="logout" AND NOT user_action="click_logout")

🔗 References

📤 Share & Export