CVE-2024-57032: Broken Authentication - Old Password
CVE Publication: https://www.cve.org/CVERecord?id=CVE-2024-57032
Vendor
WeGIA (Web Gerenciador Institucional) is an integrated management system licensed under the GNU GPL v3.0, designed to enhance administration, control, and transparency for institutions.
https://sol.sbc.org.br/index.php/latinoware/article/view/31544
Affected Product Code Base
WeGIA < v3.2.0
Vulnerability Description
A security vulnerability was identified in the web application WeGIA, where it is possible to change a user's password without verifying the old password. This issue exists in the control.php
endpoint and allows unauthorized attackers to bypass authentication and authorization mechanisms to reset the password of any user, including admin accounts.
POC
Vulnerable Endpoint: POST /WeGIA/controle/control.php
HTTP Request Example:
|
|
Observations:
Missing Password Validation: The senha_antiga
parameter is not validated, allowing the password to be reset without verifying the user's existing password.
Change the default password wegiafrom admin user and use a random value in the field senha_antiga
:
Login with the new password:
References
https://github.com/nilsonLazarin/WeGIA/issues/814
https://github.com/LabRedesCefetRJ/WeGIA/
Discoverer
By: CVE-Hunters