CVE-2025-41337

7.5 HIGH

📋 TL;DR

An authorization bypass vulnerability in CanalDenuncia.app allows attackers to access other users' information by manipulating the 'web' parameter in a POST request to '/backend/api/buscarSSOParametros.php'. This affects all users of vulnerable CanalDenuncia.app installations.

💻 Affected Systems

Products:
  • CanalDenuncia.app
Versions: All versions prior to patch
Operating Systems: All platforms running CanalDenuncia.app
Default Config Vulnerable: ⚠️ Yes
Notes: Affects web applications using the vulnerable API endpoint regardless of underlying OS.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all user data including sensitive personal information, potentially leading to identity theft, regulatory violations, and reputational damage.

🟠

Likely Case

Unauthorized access to multiple users' personal information and case details, enabling data harvesting and privacy violations.

🟢

If Mitigated

Limited or no data exposure if proper authorization checks and input validation are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires sending crafted POST requests but does not require authentication to the target user accounts.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in advisory

Vendor Advisory: https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-canaldenunciaapp

Restart Required: No

Instructions:

1. Contact CanalDenuncia.app vendor for patched version. 2. Apply authorization checks to '/backend/api/buscarSSOParametros.php'. 3. Validate and sanitize 'web' parameter input. 4. Implement proper session management and access controls.

🔧 Temporary Workarounds

Web Application Firewall Rule

all

Block or monitor suspicious POST requests to the vulnerable endpoint

WAF specific - configure rule to inspect POST requests to '/backend/api/buscarSSOParametros.php' for parameter manipulation

Endpoint Restriction

linux

Restrict access to the vulnerable API endpoint

iptables -A INPUT -p tcp --dport 80 -m string --string '/backend/api/buscarSSOParametros.php' --algo bm -j DROP
Similar rule for port 443 if HTTPS

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the application
  • Deploy additional monitoring and alerting for unauthorized access attempts to user data

🔍 How to Verify

Check if Vulnerable:

Test by sending POST request to '/backend/api/buscarSSOParametros.php' with manipulated 'web' parameter and checking if unauthorized data is returned.

Check Version:

Check application version through admin interface or contact vendor

Verify Fix Applied:

Attempt the same exploit after patch - should receive authorization error or no data when using unauthorized parameters.

📡 Detection & Monitoring

Log Indicators:

  • Multiple POST requests to '/backend/api/buscarSSOParametros.php' with varying 'web' parameter values
  • Unusual data access patterns from single IP

Network Indicators:

  • POST requests to vulnerable endpoint with parameter manipulation
  • Unusual data volume from API endpoint

SIEM Query:

source="web_logs" AND uri_path="/backend/api/buscarSSOParametros.php" AND http_method="POST" AND (parameter_count > normal_baseline OR user_agent_suspicious = true)

🔗 References

📤 Share & Export