CVE-2024-56883

8.1 HIGH

📋 TL;DR

Sage DPW versions before 2024_12_001 have an improper access control vulnerability where server-side role checks are inconsistently enforced. Low-privileged users with employee roles can create external courses for other employees by modifying request parameters, bypassing UI restrictions. This affects all organizations using vulnerable Sage DPW installations.

💻 Affected Systems

Products:
  • Sage DPW
Versions: All versions before 2024_12_001
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations with employee role users are vulnerable. Requires authenticated access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Malicious insider or compromised low-privileged account creates unauthorized courses for other employees, potentially leading to data manipulation, privilege escalation, or disruption of training management systems.

🟠

Likely Case

Employees accidentally or intentionally create courses for colleagues without proper authorization, causing administrative confusion and potential compliance violations.

🟢

If Mitigated

With proper network segmentation and monitoring, impact is limited to unauthorized course creation within the training management module.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access and ability to intercept/modify HTTP requests. No public exploit code available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024_12_001

Vendor Advisory: https://www.sage.com/en-gb/products/sage-dpw/

Restart Required: No

Instructions:

1. Backup your Sage DPW database and configuration. 2. Download and install Sage DPW version 2024_12_001 or later from the official Sage portal. 3. Follow the upgrade wizard instructions. 4. Verify the installation completes successfully.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict access to Sage DPW application to only authorized users and networks

Web Application Firewall Rules

all

Implement WAF rules to block requests with modified user ID parameters

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach the Sage DPW application
  • Enable detailed logging of all course creation activities and monitor for unauthorized actions

🔍 How to Verify

Check if Vulnerable:

Check Sage DPW version in administration panel. If version is earlier than 2024_12_001, system is vulnerable.

Check Version:

Check Administration → System Information in Sage DPW web interface

Verify Fix Applied:

After patching, verify version shows 2024_12_001 or later. Test with low-privileged user attempting to create courses for other users.

📡 Detection & Monitoring

Log Indicators:

  • Course creation requests where requester ID differs from target user ID
  • Multiple course creation attempts from single user for different employees

Network Indicators:

  • HTTP POST requests to course creation endpoints with modified 'id' parameters
  • Unusual patterns of course creation activity

SIEM Query:

source="sage_dpw_logs" AND action="create_course" AND user_id != target_user_id

🔗 References

📤 Share & Export