CVE | Vulnerability name | Date | Responsible Security Disclosure by | Vulnerabilities |
---|---|---|---|---|
VRF#20-08-SGSSC. | Bypassbleed |
2020-02-26 01:36 EET |
Dejan Zelic, Justin Benjamin and others at Offensive Security Did send detailed report and helped fixing! |
|
Timeline | Details |
---|---|
2020-02-26 01:36 EET |
Report received. Hello, I am writing to you to report vulnerabilities in the latest version of Wekan. One of which is an authentication bypass. Auth Bypass
Name: Dejan Zelic (Working at Offensive Security) Here is an example:
Unauthenticated SSRFName: Dejan Zelic (Working at Offensive Security)
(Please note that the userId has to be valid but does not have to be logged in) It is possible to use this vulnerability to port scan the internal network. If the content obtained returns a 200 status code, the content can be seen in the websocket.
Here is an example of obtaining the content running on
DoSName: Dejan Zelic (Working at Offensive Security) Depending on the system, the attacker will repeat adding and removing labels to a card a few times and the system will significantly slow down. (Older systems seem to be more impacted by this issue. Newer version of Wekan don't have as big of a problem.) Unauthenticated Username ChangeName: Dejan Zelic (Working at Offensive Security) and Justin Benjamin (Working at Offensive
Security)
Unauthenticated Os StatisticsName: Justin Benjamin (Working at Offensive Security) It is possible for an unauthenticated user to access operating system statistics like the OS type, uptime, kernel version, memory, cpu, mongo version, etc. . This is done with the following code:
Opening the websockets communication tab in a browser debugger shows us the result of this communication:
We are following the standard 90 days before public disclosure. Please let me know if you have any questions. Thank you, |
2020-03-23 | Wekan v3.81 released by xet7 with fix: "Fix critical and moderate security vulnerabilities reported at 2020-02-26 with responsible disclosure by Dejan Zelic, Justin Benjamin and others at Offensive Security, that follow standard 90 days before public disclosure. Thanks to xet7." |