CVE-2025-41336

7.5 HIGH

📋 TL;DR

An authorization bypass vulnerability in CanalDenuncia.app allows attackers to access other users' information by manipulating the 'web' parameter in a POST request to '/backend/api/buscarConfiguracionParametros.php'. This affects all users of the vulnerable application who have their data stored in the system.

💻 Affected Systems

Products:
  • CanalDenuncia.app
Versions: All versions prior to patch
Operating Systems: All platforms running the web application
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the web application interface regardless of underlying OS or hosting environment.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Mass data breach exposing all user information including potentially sensitive personal data, whistleblower identities, and confidential reports.

🟠

Likely Case

Targeted data extraction of specific users' information leading to privacy violations and potential identity theft.

🟢

If Mitigated

No unauthorized access occurs due to proper authorization checks and parameter validation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires sending crafted POST requests but does not require authentication to the application.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown specific version

Vendor Advisory: https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-canaldenunciaapp

Restart Required: Yes

Instructions:

1. Contact CanalDenuncia.app vendor for patched version. 2. Apply vendor-provided patch. 3. Restart application services. 4. Verify fix implementation.

🔧 Temporary Workarounds

Web Application Firewall Rule

all

Block or sanitize requests to '/backend/api/buscarConfiguracionParametros.php' with suspicious 'web' parameter values

WAF-specific configuration required

Input Validation Filter

all

Implement server-side validation to restrict 'web' parameter to expected values only

Application-specific code modification required

🧯 If You Can't Patch

  • Isolate the application behind strict network segmentation to limit access
  • Implement comprehensive logging and monitoring of all requests to the vulnerable endpoint

🔍 How to Verify

Check if Vulnerable:

Send POST request to '/backend/api/buscarConfiguracionParametros.php' with manipulated 'web' parameter and observe if unauthorized data is returned

Check Version:

Check application version through admin interface or contact vendor

Verify Fix Applied:

Attempt the same exploit after patching and confirm access is properly denied with appropriate error messages

📡 Detection & Monitoring

Log Indicators:

  • Multiple POST requests to '/backend/api/buscarConfiguracionParametros.php' with unusual 'web' parameter values
  • Access logs showing data retrieval patterns inconsistent with normal user behavior

Network Indicators:

  • Unusual traffic patterns to the vulnerable endpoint
  • POST requests with manipulated parameters

SIEM Query:

source="web_server" AND uri="/backend/api/buscarConfiguracionParametros.php" AND method="POST" AND (parameter="web" AND value!="expected_value")

🔗 References

📤 Share & Export