CVE-2024-5995

8.8 HIGH

📋 TL;DR

The Soar Cloud HR Portal sends notification emails containing links with embedded sessions that remain valid for over 7 days due to improper session expiration configuration. This allows attackers to reuse these sessions to gain unauthorized access to user accounts. Organizations using Soar Cloud HR Portal are affected.

💻 Affected Systems

Products:
  • Soar Cloud HR Portal
Versions: Specific versions not specified in references; likely all versions with the vulnerable email notification feature.
Operating Systems: Not OS-dependent; web application vulnerability.
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems where notification emails with session links are enabled.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain unauthorized access to sensitive HR data, perform privilege escalation, manipulate employee records, or access confidential information.

🟠

Likely Case

Unauthorized access to user accounts leading to data exposure, identity theft, or unauthorized actions within the HR portal.

🟢

If Mitigated

Limited impact with proper session management, monitoring, and access controls in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires intercepting or accessing email links; no authentication needed once link is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in references; check vendor advisory.

Vendor Advisory: https://www.twcert.org.tw/en/cp-139-7872-1c8b4-2.html

Restart Required: No

Instructions:

1. Apply the latest patch from Soar Cloud. 2. Update session expiration settings to proper values (e.g., less than 24 hours). 3. Disable embedded sessions in emails if possible.

🔧 Temporary Workarounds

Disable Email Session Links

all

Temporarily disable notification emails containing session links to prevent exploitation.

Check Soar Cloud HR Portal admin settings for email configuration.

Implement Session Timeout

all

Manually configure session expiration to a shorter duration (e.g., 1 hour) via application settings.

Access session management settings in Soar Cloud HR Portal admin panel.

🧯 If You Can't Patch

  • Monitor email logs and access patterns for suspicious session reuse.
  • Implement network segmentation and restrict access to the HR portal to trusted IPs only.

🔍 How to Verify

Check if Vulnerable:

Test if notification emails contain session links that remain valid beyond 7 days by clicking an old link.

Check Version:

Check Soar Cloud HR Portal version in admin interface or contact vendor.

Verify Fix Applied:

Verify that session links in emails expire within a short timeframe (e.g., less than 24 hours) after patch application.

📡 Detection & Monitoring

Log Indicators:

  • Multiple access attempts from different IPs using the same session token.
  • Unusual login patterns from email-referral links.

Network Indicators:

  • HTTP requests with long-lived session tokens originating from email clients.

SIEM Query:

source="soar_cloud_logs" AND (event="session_reuse" OR token_age>604800)

🔗 References

📤 Share & Export