Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-23342 PoC — Hyland Onbase Application Server 安全漏洞

Source
Associated Vulnerability
Title:Hyland Onbase Application Server 安全漏洞 (CVE-2022-23342)
Description:The Hyland Onbase Application Server releases prior to 20.3.58.1000 and OnBase releases 21.1.1.1000 through 21.1.15.1000 are vulnerable to a username enumeration vulnerability. An attacker can obtain valid users based on the response returned for invalid and valid users by sending a POST login request to the /mobilebroker/ServiceToBroker.svc/Json/Connect endpoint. This can lead to user enumeration against the underlying Active Directory integrated systems.
Readme
# CVE-2022-23342
Security Advisory – Username Enumeration in OnBase

 

Affected software versions and builds: OnBase Application Server

 

OnBase releases prior to 20.3.58.1000 and OnBase releases 21.1.1.1000 through 21.1.15.1000 are impacted.

 

Fixed software versions and builds:

OnBase EP3 releases greater than or equal to 20.3.58.1000
OnBase EP5 releases greater than or equal to 21.1.16.1000
 

Bulletin: 202206-ONBASE-1

CVSS severity: Medium

CVSS score: 5.3

CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

 

Issue description    

Through responsible disclosure with a security researcher, Hyland is aware that OnBase is susceptible to Active Directory username enumeration during authentication. Successful exploitation could allow unauthenticated users to identify valid and invalid Active Directory usernames. The reported vulnerability has been investigated and the findings have been remediated.

 

Corrective action

If you are using software listed in the “Affected Software Versions and Builds” section of this bulletin, you can remediate this vulnerability by upgrading to a version listed in the “Fixed Software Versions and Builds” section by engaging your first line of support.


POC
The Hyland OnBase allows an external attacker to perform username enumeration due to the response returned by the system e.g. the system responds with different errors for valid and invalid users. For invalid users, the system returns “An unknown login error occurred.” for valid users, a “success” or " Login failed." error is returned.
An attack can enumerate instances by sending a login POST request to the  /mobilebroker/ServiceToBroker.svc/Json/Connect endpoint. This can lead to user enumeration against the underlying Active Directory-integrated systems.

![image](https://user-images.githubusercontent.com/954507/174392068-dbfe64cf-a2c6-43fc-b16a-5a242707bbc5.png)

File Snapshot

[4.0K] /data/pocs/736271bfb40959da647f9b8ffadbe4c6a51cfe17 └── [1.9K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →