CVE-2025-1644

4.3 MEDIUM

📋 TL;DR

This CSRF vulnerability in Benner ModernaNet allows attackers to trick authenticated users into performing unintended actions by manipulating the 'idItAg' parameter in the /DadosPessoais/SG_Gravar endpoint. It affects ModernaNet versions up to 1.2.0. Attackers can exploit this remotely without direct access to the target system.

💻 Affected Systems

Products:
  • Benner ModernaNet
Versions: up to 1.2.0
Operating Systems: Not specified - likely web application independent of OS
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the /DadosPessoais/SG_Gravar endpoint with idItAg parameter manipulation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could manipulate personal data records, modify user permissions, or perform unauthorized administrative actions through authenticated user sessions.

🟠

Likely Case

Data integrity compromise where attackers modify or delete personal data records through CSRF attacks against authenticated users.

🟢

If Mitigated

Limited impact with proper CSRF protections, session management, and network segmentation in place.

🌐 Internet-Facing: MEDIUM - Attack requires user interaction but can be delivered via phishing or malicious sites.
🏢 Internal Only: LOW - Requires internal user interaction; network segmentation reduces exposure.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

CSRF attacks typically require user interaction but are straightforward to implement once endpoint details are known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.2.1

Vendor Advisory: Not provided in references

Restart Required: Yes

Instructions:

1. Backup current installation and data. 2. Download ModernaNet version 1.2.1 from official vendor source. 3. Follow vendor upgrade procedures. 4. Restart application services. 5. Verify functionality.

🔧 Temporary Workarounds

Implement CSRF Tokens

all

Add anti-CSRF tokens to forms and validate them server-side

SameSite Cookie Attribute

all

Set SameSite=Strict or Lax attributes on session cookies

Set-Cookie: session=value; SameSite=Strict; Secure; HttpOnly

🧯 If You Can't Patch

  • Implement WAF rules to detect and block CSRF attempts on /DadosPessoais/SG_Gravar endpoint
  • Use network segmentation to restrict access to ModernaNet from untrusted networks

🔍 How to Verify

Check if Vulnerable:

Check application version in admin panel or configuration files. If version is ≤1.2.0, system is vulnerable.

Check Version:

Check application configuration or admin interface for version information

Verify Fix Applied:

After upgrading to 1.2.1, test CSRF protection by attempting to submit requests without proper tokens to /DadosPessoais/SG_Gravar.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed POST requests to /DadosPessoais/SG_Gravar without referrer headers
  • Unusual parameter manipulation in idItAg field

Network Indicators:

  • Cross-origin requests to /DadosPessoais/SG_Gravar endpoint
  • Requests lacking CSRF tokens or proper referrer validation

SIEM Query:

source="modernanet.log" AND uri="/DadosPessoais/SG_Gravar" AND (NOT referrer CONTAINS "expected-domain.com" OR csrf_token IS NULL)

🔗 References

📤 Share & Export