CVE-2025-41069

N/A Unknown

📋 TL;DR

This CVE describes an Insecure Direct Object Reference (IDOR) vulnerability in DeporSite by T-INNOVA. Attackers can manipulate the 'idUsuario' parameter in API requests to access or modify unauthorized user consent data. Organizations using DeporSite are affected.

💻 Affected Systems

Products:
  • DeporSite by T-INNOVA
Versions: Specific versions not specified in advisory
Operating Systems: Any OS running DeporSite
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the '/ajax/TInnova_v2/Formulario_Consentimiento/llamadaAjax/obtenerDatosConsentimientos' endpoint

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all user consent data, allowing unauthorized access to sensitive personal information and potential regulatory violations.

🟠

Likely Case

Unauthorized viewing or modification of other users' consent records, leading to privacy breaches and data integrity issues.

🟢

If Mitigated

Limited impact with proper access controls and parameter validation in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but minimal technical skill to manipulate parameters

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified

Vendor Advisory: https://www.incibe.es/en/incibe-cert/notices/aviso/insecure-direct-object-references-idor-deporsite-t-innova-deporsite

Restart Required: No

Instructions:

Contact T-INNOVA for patch information and apply when available

🔧 Temporary Workarounds

Implement Access Control Validation

all

Add server-side authorization checks to verify users can only access their own data

Use Indirect Object References

all

Replace direct IDs with unpredictable tokens or session-based references

🧯 If You Can't Patch

  • Implement Web Application Firewall (WAF) rules to detect and block suspicious parameter manipulation
  • Monitor API logs for unusual access patterns to the vulnerable endpoint

🔍 How to Verify

Check if Vulnerable:

Test if changing 'idUsuario' parameter values returns data for other users without authorization errors

Check Version:

Check with T-INNOVA for current version and patch status

Verify Fix Applied:

Verify that parameter manipulation attempts return proper authorization errors and only allow access to authenticated user's own data

📡 Detection & Monitoring

Log Indicators:

  • Multiple different 'idUsuario' values accessed by single user account
  • Rapid sequential requests with incrementing ID parameters

Network Indicators:

  • HTTP requests to vulnerable endpoint with manipulated 'idUsuario' parameters

SIEM Query:

source="web_logs" AND uri="/ajax/TInnova_v2/Formulario_Consentimiento/llamadaAjax/obtenerDatosConsentimientos" AND parameter="idUsuario" AND count(idUsuario) > threshold

🔗 References

📤 Share & Export