CVE-2025-49009

6.2 MEDIUM

📋 TL;DR

This vulnerability exposes Facebook user access tokens in plain text within application logs when Facebook authentication requests fail in Para versions before 1.50.8. Any Para server using Facebook authentication with logging enabled is affected. The exposed tokens could allow unauthorized access to Facebook user accounts and data.

💻 Affected Systems

Products:
  • Para (Erudika)
Versions: All versions prior to 1.50.8
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects deployments using Facebook authentication with Para's FacebookAuthFilter. Logging must be enabled at WARN level or higher.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain access to log files containing Facebook access tokens, then use those tokens to impersonate users, access private Facebook data, or perform unauthorized actions on Facebook-connected applications.

🟠

Likely Case

Internal personnel or log monitoring systems inadvertently expose tokens, leading to potential account compromise if logs are not properly secured or if token reuse occurs.

🟢

If Mitigated

With proper log access controls and monitoring, token exposure is limited to authorized personnel only, reducing but not eliminating the risk of misuse.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to application logs, which typically requires some level of system access or log aggregation system access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.50.8

Vendor Advisory: https://github.com/Erudika/para/security/advisories/GHSA-qx7g-fx8q-545g

Restart Required: Yes

Instructions:

1. Update Para to version 1.50.8 or later. 2. Restart the Para server. 3. Verify the fix by checking that access tokens are no longer logged in plain text during failed Facebook authentication requests.

🔧 Temporary Workarounds

Disable Facebook authentication logging

all

Configure logging to exclude WARN-level messages from FacebookAuthFilter or disable Facebook authentication entirely if not needed.

Modify log4j.properties or equivalent: log4j.logger.com.erudika.para.security.FacebookAuthFilter=ERROR

Restrict log access

linux

Implement strict access controls on log files and log aggregation systems to prevent unauthorized access.

chmod 600 para.log
setfacl -m u:para:r para.log

🧯 If You Can't Patch

  • Implement strict access controls on all log storage and aggregation systems
  • Regularly audit and monitor log access patterns for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check if Para version is below 1.50.8 and if Facebook authentication is configured. Examine logs for WARN messages containing 'FacebookAuthFilter' and access token strings.

Check Version:

Check Para configuration file or run: java -jar para.jar --version

Verify Fix Applied:

After updating to 1.50.8+, trigger a failed Facebook authentication request and verify that access tokens are no longer visible in WARN-level logs.

📡 Detection & Monitoring

Log Indicators:

  • WARN-level log entries containing 'FacebookAuthFilter' followed by URL parameters with 'access_token='

Network Indicators:

  • Increased failed authentication attempts to Facebook endpoints

SIEM Query:

source="para.log" AND "FacebookAuthFilter" AND "access_token=" AND level="WARN"

🔗 References

📤 Share & Export