Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-31445 PoC — Cassia Networks Access controller 安全漏洞

Source
Associated Vulnerability
Title:Cassia Networks Access controller 安全漏洞 (CVE-2023-31445)
Description:Cassia Access controller before 2.1.1.2203171453, was discovered to have a unprivileged -information disclosure vulnerability that allows read-only users have the ability to enumerate all other users and discover e-mail addresses, phone numbers, and privileges of all other users.
Description
Repository contains description for CVE-2023-31445
Readme
# CVE-2023-31445-Unprivileged-Information-Disclosure
Repository contains description for CVE-2023-31445 discovered by Dodge Industrial Team for Dodge OPTIFY platfrom.
___  
CVE ID: CVE-2023-31445  
Vendor: Cassia Networks  
Product: Access Controller  
Version: Cassia-AC-2.1.1.2203171453  
___
Vulnerability: Unprivileged Information Disclosure  
Affected: logs, users data  
Decription: Read-only users have ability to enumerate all other users and disclose information as e-mail addresses, phone numbers and privileges of all other users. This may lead to further steps as targeted e-mail campaigns and social engineering attacks.  
Status: Confirmed by vendor, Fixed  
Version Patched: Cassia-AC-2.1.1.2207292123
____
#### Details
Administrator account has privileges to see data of all of the users registered in Access Controller as example:
![](img/image1.jpg)

Read-Only user can only view himself:
![](img/image2.jpg)

Edit Account invokes /admin/(userId)/edit, wher Id is the UserId:
![](img/image3.jpg)
![](img/image4.jpg)

There is no validation between permissions and actual userId that Read-Only user uses in the request.  
It allows Read-Only user to enumerate all other users without administrative access.  This is considered as Unprivileged Information Disclosure.  
It can be achieved by bruteforcing.  
More of that, Id can be easily guessed as it is UNIX time format of exact user creation
date - what can be obtain from the logs which are all also visible for Read-Only user.  
____
#### Exploitation
Every of the activity is done from tester (Read-Only user) context.
1) Gather information about account creation from logs
![](img/image5.jpg)  
  
2) Convert data to UNIX format
![](img/image6.jpg)  

Table from PoC

| Username | Time Log | Time UNIX | Permissions |
| ------------- | ------------- | ------------- | ------------- |
| User1 | 2022-07-21T05:25:31.054-04:00 | 1658395531054 | Readonly |
| User2 | 2022-07-21T05:26:08.660-04:00 | 1658395568660 | Readonly |
| User3 | 2022-07-21T05:26:24.669-04:00 | 1658395584669 | Readonly |
| Testadmin | 2022-07-21T06:56:11.189-04:00 | 1658400971189 | Administrator |

Note! There might be little variation between UNIX timestamp and assigned Id (+-1)  
it depends on the speed of the server and current occupation of processing resources.


3) Enumerate API endpoint  
Burp was used in this PoC  
![](img/image7.jpg)
![](img/image8.jpg)

4) Run enumeration and gather outcomes

![](img/image9.jpg)
![](img/image10.jpg)
![](img/image11.jpg)
![](img/image12.jpg)

#### Remediation
- Patch to the highest possible version availaible on [Cassia Networks](https://www.cassianetworks.com/)
File Snapshot

[4.0K] /data/pocs/8e87df2d2a099037694e4c6a5cf1830f595c5ed6 ├── [4.0K] img │   ├── [2.6M] image10.jpg │   ├── [2.6M] image11.jpg │   ├── [2.6M] image12.jpg │   ├── [1.5M] image1.jpg │   ├── [2.4M] image2.jpg │   ├── [1.9M] image3.jpg │   ├── [2.1M] image4.jpg │   ├── [2.4M] image5.jpg │   ├── [229K] image6.jpg │   ├── [3.5M] image7.jpg │   ├── [3.5M] image8.jpg │   └── [2.6M] image9.jpg └── [2.6K] README.md 1 directory, 13 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →