CVE-2024-7920

4.3 MEDIUM

📋 TL;DR

This vulnerability allows unauthorized remote access to the /Report/ParkCommon/GetParkInThroughDeivces endpoint in Anhui Deshun Intelligent Technology's Jieshun JieLink+ JSOTC2016 parking management software. Attackers can exploit improper access controls to access sensitive functions without authentication. Organizations using affected versions of this parking management system are at risk.

💻 Affected Systems

Products:
  • Anhui Deshun Intelligent Technology Jieshun JieLink+ JSOTC2016
Versions: up to 20240805
Operating Systems: Unknown
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the parking management system's web interface component. The exact operating system requirements are not specified in available documentation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could gain unauthorized access to parking system functions, potentially manipulating entry/exit records, accessing sensitive vehicle data, or disrupting parking operations.

🟠

Likely Case

Unauthorized access to parking system data and functions, potentially exposing vehicle entry/exit information and system configuration details.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls, potentially only exposing non-critical system information.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details have been publicly disclosed, making this vulnerability easy to exploit with minimal technical skill required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Contact vendor Anhui Deshun Intelligent Technology for updated version information and security patches.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to the vulnerable endpoint using firewall rules or network segmentation

Web Application Firewall

all

Implement WAF rules to block unauthorized access to /Report/ParkCommon/GetParkInThroughDeivces endpoint

🧯 If You Can't Patch

  • Isolate the parking management system on a separate network segment with strict access controls
  • Implement authentication proxy in front of the vulnerable endpoint to add additional access controls

🔍 How to Verify

Check if Vulnerable:

Test if unauthorized access to http://[target]/Report/ParkCommon/GetParkInThroughDeivces is possible without authentication

Check Version:

Check system version through web interface or contact vendor for version identification methods

Verify Fix Applied:

Verify that unauthorized access to the vulnerable endpoint is no longer possible

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to /Report/ParkCommon/GetParkInThroughDeivces
  • Unusual traffic patterns to parking system endpoints

Network Indicators:

  • HTTP requests to vulnerable endpoint from unauthorized sources
  • Unusual data extraction patterns from parking system

SIEM Query:

source_ip NOT IN authorized_ips AND url_path CONTAINS '/Report/ParkCommon/GetParkInThroughDeivces'

🔗 References

📤 Share & Export