CVE-2024-9970

8.8 HIGH

📋 TL;DR

The FlowMaster BPM Plus system has a privilege escalation vulnerability where remote attackers with regular user privileges can manipulate a specific cookie to gain administrator access. This affects all organizations using vulnerable versions of FlowMaster BPM Plus. Attackers can take full control of the system once they elevate privileges.

💻 Affected Systems

Products:
  • FlowMaster BPM Plus
Versions: All versions prior to the fix
Operating Systems: All supported OS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all deployments with regular user accounts. The vulnerability is in the authentication mechanism.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with administrative control, allowing data theft, system manipulation, and further network penetration.

🟠

Likely Case

Attackers gain administrative access to the BPM system, enabling data exfiltration, configuration changes, and potential lateral movement.

🟢

If Mitigated

Limited impact if proper network segmentation and monitoring are in place, though administrative access to the BPM system would still be compromised.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires existing regular user credentials. Exploitation involves cookie manipulation which is straightforward for attackers with basic web skills.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific version

Vendor Advisory: https://www.twcert.org.tw/en/cp-139-8137-ea537-2.html

Restart Required: Yes

Instructions:

1. Contact NewType for the security patch. 2. Apply the patch to all FlowMaster BPM Plus instances. 3. Restart the application services. 4. Verify the fix by testing privilege escalation attempts.

🔧 Temporary Workarounds

Cookie Validation Enhancement

all

Implement additional server-side validation for authentication cookies to detect tampering

Requires custom application modification - consult vendor for implementation details

Network Segmentation

all

Isolate FlowMaster BPM Plus systems from critical network segments

firewall rules to restrict access to necessary IPs only

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach the FlowMaster system
  • Enable detailed logging of authentication events and monitor for privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Test if regular users can modify authentication cookies to gain admin access. Check application version against vendor advisory.

Check Version:

Check application admin panel or consult vendor documentation for version check procedure

Verify Fix Applied:

Attempt the cookie manipulation exploit after patching - it should fail. Verify new version matches vendor's patched version.

📡 Detection & Monitoring

Log Indicators:

  • Multiple privilege escalation attempts
  • Unusual admin access from regular user accounts
  • Cookie manipulation patterns in web logs

Network Indicators:

  • HTTP requests with modified authentication cookies
  • Unusual admin-level API calls from regular user sessions

SIEM Query:

source="flowmaster" AND (event_type="authentication" AND result="success" AND user_role_changed="true")

🔗 References

📤 Share & Export