CVE-2025-1270

9.1 CRITICAL

📋 TL;DR

This CVE describes an Insecure Direct Object Reference (IDOR) vulnerability in Anapi Group's h6web software that allows authenticated attackers to access other users' information by manipulating the 'pkrelated' parameter. Attackers can also impersonate other users, gaining their privileges for subsequent requests. All organizations using vulnerable versions of h6web are affected.

💻 Affected Systems

Products:
  • Anapi Group h6web
Versions: Specific versions not specified in reference - all versions with vulnerable endpoint
Operating Systems: All operating systems running h6web
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the '/h6web/ha_datos_hermano.php' endpoint with 'pkrelated' parameter manipulation

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all user data, privilege escalation to administrative accounts, and unauthorized access to sensitive information across the entire system.

🟠

Likely Case

Unauthorized access to other users' personal information, potential data theft, and privilege escalation within the application.

🟢

If Mitigated

Limited impact with proper access controls, but still potential for some unauthorized data access if other security layers fail.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward via parameter manipulation in POST requests

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified

Vendor Advisory: https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-anapi-group-h6web

Restart Required: No

Instructions:

1. Check vendor advisory for updates 2. Apply any available patches 3. Test in staging environment 4. Deploy to production

🔧 Temporary Workarounds

Web Application Firewall Rule

all

Block or sanitize requests to vulnerable endpoint with suspicious parameter values

WAF-specific configuration required

Endpoint Access Restriction

linux

Restrict access to /h6web/ha_datos_hermano.php endpoint

# Apache: RewriteRule ^/h6web/ha_datos_hermano\.php$ - [F]
# Nginx: location ~ ^/h6web/ha_datos_hermano\.php$ { deny all; }

🧯 If You Can't Patch

  • Implement strict access controls and session validation
  • Monitor for unusual access patterns to the vulnerable endpoint

🔍 How to Verify

Check if Vulnerable:

Test authenticated POST requests to /h6web/ha_datos_hermano.php with modified pkrelated parameter values

Check Version:

Check h6web version through application interface or configuration files

Verify Fix Applied:

Verify parameter manipulation no longer allows unauthorized data access or user impersonation

📡 Detection & Monitoring

Log Indicators:

  • Multiple POST requests to /h6web/ha_datos_hermano.php with varying pkrelated values
  • User sessions switching between different accounts rapidly

Network Indicators:

  • Unusual parameter values in POST requests
  • Multiple user data accesses from single session

SIEM Query:

source="web_logs" AND uri_path="/h6web/ha_datos_hermano.php" AND http_method="POST" AND (pkrelated!=session_user_id OR pkrelated_pattern=wildcard)

🔗 References

📤 Share & Export