CVE-2024-7266

4.3 MEDIUM

πŸ“‹ TL;DR

This vulnerability allows logged-in users in the EZD RP system to list all users, including those from other organizations, violating access control boundaries. It affects EZD RP versions 15 before 15.84, 16 before 16.15, and 17 before 17.2. The issue stems from incorrect user management (CWE-863) that fails to properly enforce organizational isolation.

πŸ’» Affected Systems

Products:
  • Naukowa i Akademicka SieΔ‡ Komputerowa - PaΕ„stwowy Instytut Badawczy EZD RP
Versions: from 15 before 15.84, from 16 before 16.15, from 17 before 17.2
Operating Systems: Not specified
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all deployments of the specified EZD RP versions regardless of configuration.

πŸ“¦ What is this software?

⚠️ Risk & Real-World Impact

πŸ”΄

Worst Case

An attacker could enumerate all user accounts across organizations, potentially facilitating targeted attacks, credential theft, or social engineering campaigns against users from different entities.

🟠

Likely Case

Information disclosure where users can see names, usernames, or organizational affiliations of other users they shouldn't have access to, potentially violating privacy regulations.

🟒

If Mitigated

Limited impact with proper logging and monitoring that could detect unusual enumeration attempts, though some information disclosure may still occur.

🌐 Internet-Facing: MEDIUM
🏒 Internal Only: HIGH

🎯 Exploit Status

Public PoC: βœ… No
Weaponized: UNKNOWN
Unauthenticated Exploit: βœ… No
Complexity: LOW

Requires authenticated access but appears to be a simple enumeration vulnerability once logged in.

πŸ› οΈ Fix & Mitigation

βœ… Official Fix

Patch Version: 15.84, 16.15, 17.2

Vendor Advisory: https://www.gov.pl/web/ezd-rp

Restart Required: Yes

Instructions:

1. Identify current EZD RP version. 2. Download appropriate patch from vendor. 3. Apply patch according to vendor instructions. 4. Restart EZD RP services. 5. Verify fix by testing user enumeration.

πŸ”§ Temporary Workarounds

Restrict User Access

all

Limit user permissions to minimum required functionality to reduce attack surface.

Enhanced Monitoring

all

Implement logging and alerting for user enumeration activities.

🧯 If You Can't Patch

  • Implement network segmentation to isolate EZD RP systems from untrusted networks
  • Deploy web application firewall rules to detect and block user enumeration patterns

πŸ” How to Verify

Check if Vulnerable:

Log into EZD RP as a standard user and attempt to list users from other organizations using system functionality.

Check Version:

Check EZD RP administration interface or configuration files for version information.

Verify Fix Applied:

After patching, attempt the same user enumeration test to confirm access is properly restricted to own organization.

πŸ“‘ Detection & Monitoring

Log Indicators:

  • Unusual number of user listing requests
  • User enumeration patterns in access logs
  • Requests for user data across organizational boundaries

Network Indicators:

  • HTTP requests to user listing endpoints with parameters indicating cross-organization queries

SIEM Query:

source="ezd-rp" AND (event="user_list" OR event="user_query") AND org_id!="current_org"

πŸ”— References

πŸ“€ Share & Export