Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Divd-2024-00031 case #823

Merged
merged 13 commits into from
Dec 15, 2024
51 changes: 51 additions & 0 deletions _cases/2024/DIVD-2024-00031.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,51 @@
---
layout: case
title: "Unauthenticated Local File Inclusion vulnerability in ComfortKey"
author: Victor Pasman
lead: Alwin Warringa
excerpt: "An Unautheticated Local File Inclusion vulnerability has been found in ComfortKey, a product of Celsius Benelux. Using this vulnerability, an unauthenticated attacker may retrieve sensitive information about the underlying system."
researchers:
- Alwin Warringa
cves:
- CVE-2024-27120
product:
- ComfortKey
versions:
- < 24.1.2.
recommendation: "Check for the patched versions and get those installed"
workaround: "N/A"
patch_status: Released
status : Open
start: 2024-08-05
end:
timeline:
- start: 2024-07-02
end:
event: "DIVD contacted the vendor to disclose the vulnerability."
- start: 2024-07-04
end:
event: "Supplier created/delivered beta version for retesting."
- start: 2024-07-05
end:
event: "Patch was verified, vulnerability was resolved."
- start: 2024-08-05
end:
event: "First version of this casefile."
# ips: 0

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Ik mis de settings om dit een locale cve te maken zie template case 3000-1 of 3000-2

---

## Summary
An Unauthenticated Local File Inclusion vulnerability has been found in ComfortKey, a product of Celsius Benelux. Using this vulnerability, an unauthenticated attacker may retrieve sensitive information about the underlying system.

## Recommendations
Comfort Key released patched version 24.1.2. Please update to this version number or higher if possible.


## What we are doing
DIVD is currently working to identify parties that are running a vulnerable version of Geoserver and to notify these parties. We do this by verifying the presence of the vulnerability in a harmless manner and collect the software version number if possible.

{% include timeline.html %}

## More information
* {% cve CVE-2024-27120 %}
135 changes: 135 additions & 0 deletions _data/cves/2024/CVE-2024-27120.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,135 @@
{
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"cveMetadata": {
"cveId": "CVE-2024-27120",
"assignerOrgId": "00000000-0000-4000-9000-000000000000",
"requesterUserId": "00000000-0000-4000-9000-000000000000",
"serial": 1,
"state": "PUBLISHED"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "00000000-0000-4000-9000-000000000000"
},
"title": "Local File Inclusion in ComfortKey before version 24.1.2",
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"cweId": "CWE-200",
"description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor",
"type": "CWE"
}
Comment on lines +20 to +25
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Volgens mij moet die CWE-98 zijn.
https://cwe.mitre.org/data/definitions/98.html

Copy link
Collaborator Author

@vcartman vcartman Sep 12, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Het was gewijzigd van CWE-98 naar deze omdat het PHP LFI was in overleg met Alwin, @MrSeccubus Vind je het handiger om dit alsnog te wijzigen?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

CWE-200 is wanneer gevoelige data "gewoon" wordt weergegeven, maar dit is een LFI, maar geen code execution.

Ik zou hem dan onder CWE-22 (path traversal) zetten. CWE-98 is idd LFI van PHP code, wat hier niet het geval is.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

CWE-41 is misschien een nog beter match https://cwe.mitre.org/data/definitions/41.html

]
}
],
"impacts": [
{
"capecId": "CAPEC-126",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-126 Path Traversal"
}
]
}
],
"affected": [
{
"vendor": "Celsius Benelux",
"product": "ComfortKey",
"versions": [
{
"status": "affected",
"version": "*",
"lessThan": "24.1.2"
}
],
"defaultStatus": "unaffected"
}
],
"descriptions": [
{
"lang": "en",
"value": "A Local File Inclusion vulnerability has been found in ComfortKey, a product of Celsius Benelux. Using this vulnerability, an unauthenticated attacker may retrieve sensitive information about the underlying system. The vulnerability has been remediated in version 24.1.2.",
"supportingMedia": [
{
"type": "text/html",
"base64": false,
"value": "A Local File Inclusion vulnerability has been found in ComfortKey, a product of Celsius Benelux. Using this vulnerability, an unauthenticated attacker may retrieve sensitive information about the underlying system. The vulnerability has been remediated in version 24.1.2."
}
]
}
],
"references": [
{
"url": "https://csirt.divd.nl/CVE-2024-27120",
"tags": [
"third-party-advisory"
]
},
{
"url": "https://csirt.divd.nl/DIVD-2024-00031/",
"tags": [
"third-party-advisory"
]
}
],
"metrics": [
{
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
],
"cvssV4_0": {
"version": "4.0",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"subConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "NONE",
"subIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"Safety": "PRESENT",
"Automatable": "YES",
"Recovery": "USER",
"valueDensity": "CONCENTRATED",
"vulnerabilityResponseEffort": "MODERATE",
"providerUrgency": "RED",
"baseSeverity": "HIGH",
"baseScore": 7.7,
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:H/SI:N/SA:N/S:P/AU:Y/R:U/V:C/RE:M/U:Red"
}
}
],
"credits": [
{
"lang": "en",
"value": "Alwin Warringa",
"type": "finder"
},
{
"lang": "en",
"value": "Max van der Horst",
"type": "analyst"
}
],
"source": {
"discovery": "EXTERNAL"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
}
}