CVE-2025-55462

6.5 MEDIUM

📋 TL;DR

A CORS misconfiguration in Eramba Community and Enterprise Editions allows malicious websites to perform authenticated cross-origin requests against the Eramba API. This enables attackers to steal user session data and hijack sessions without user interaction. All users running Eramba v3.26.0 are affected.

💻 Affected Systems

Products:
  • Eramba Community Edition
  • Eramba Enterprise Edition
Versions: v3.26.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Versions 3.23.3 and earlier appear unaffected. No custom configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full session hijack leading to complete compromise of Eramba accounts, data exfiltration of sensitive user information, and potential lateral movement within the system.

🟠

Likely Case

Attackers steal user session data (ID, name, email, access groups) and perform unauthorized actions using hijacked sessions.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to specific user accounts rather than system-wide compromise.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user to visit malicious website while authenticated to Eramba. No authentication bypass needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v3.28.0

Vendor Advisory: https://discussions.eramba.org/t/release-3-28-0/7860

Restart Required: Yes

Instructions:

1. Backup current Eramba installation. 2. Download v3.28.0 from official source. 3. Follow Eramba upgrade documentation. 4. Restart web server services.

🔧 Temporary Workarounds

CORS Origin Restriction

all

Configure web server to restrict Access-Control-Allow-Origin to trusted domains only

# Apache: SetEnvIf Origin "(.*)" ORIGIN=$1
# Apache: Header set Access-Control-Allow-Origin "%{ORIGIN}e" env=ORIGIN_is_allowed
# Nginx: add_header 'Access-Control-Allow-Origin' 'https://trusted-domain.com';

Disable CORS Credentials

all

Remove Access-Control-Allow-Credentials: true header from API responses

# Apache: Header unset Access-Control-Allow-Credentials
# Nginx: add_header 'Access-Control-Allow-Credentials' 'false';

🧯 If You Can't Patch

  • Implement strict CORS policies at reverse proxy/load balancer level
  • Restrict API access to internal networks only using firewall rules

🔍 How to Verify

Check if Vulnerable:

Send HTTP request to /system-api/login with Origin: https://evil.com header and check if Access-Control-Allow-Origin reflects evil.com with Access-Control-Allow-Credentials: true

Check Version:

Check Eramba admin dashboard or config files for version number

Verify Fix Applied:

Repeat vulnerable check - Access-Control-Allow-Origin should not reflect arbitrary origins and Access-Control-Allow-Credentials should be false or absent

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed CORS preflight requests
  • API requests with suspicious Origin headers
  • Unusual cross-origin API access patterns

Network Indicators:

  • HTTP responses with Access-Control-Allow-Origin: * and Access-Control-Allow-Credentials: true
  • Cross-origin requests to /system-api/* endpoints

SIEM Query:

http.response.headers:"Access-Control-Allow-Credentials: true" AND http.response.headers:"Access-Control-Allow-Origin: *"

🔗 References

📤 Share & Export