FUN WITH LINUX

FIWARE Keyrock: Activation of any new user

12 August 2024

Identifier: AIT-SA-20240514-03
Target: FIWARE Keyrock
Vendor: FIWARE
Version: all versions including 8.4
CVE: CVE-2024-42165
Accessibility: Remote
Severity: Medium (6.3)
Author: Wolfgang Hotwagner (AIT Austrian Institute of Technology)

Summary

Insufficiently random values for generating activation token in all versions of FIWARE Keyrock including 8.4 allow attackers to activate accounts of any user by predicting the token for the activation link.

Proof of Concept

The algorithm that is used to create the activation token for user, is predictable. An attacker could predict multiple future “random” numbers and activate any new user:

Code with predictable Math.random()

The route to /activate is unauthenticated:

Code that shows the unauthenticated activate-route

An authenticated non-admin user can create multiple password-reset-token and predict multiple future random keys and use them to activate new users.

For further information see Manipulate passwords of any user

Vulnerable Versions

All versions including 8.4 are affected.

Tested Versions

FIWARE Keyrock 8.4

Impact

An authenticated user can use the password reset token to predict the random number. Using the predicted number the attacker might be able to activate any new user.

Mitigation

Currently (August 12th, 2024) there is no known mitigation.

Vendor Contact Timeline

2023-12-19 Initial contact with FIWARE
2024-03-01 Asked again about the status
2024-08-12 Public disclosure

Advisory URL

[https://pentest.ait.ac.at/security-advisory/fiware-keyrock-activation-of-any-new-user/](https://pentest.ait.ac.at/security-advisory/fiware-keyrock-activation-of-any-new-user/]

[ Programming  Web  Security  Ruby  Rails  CVE  ]
Except where otherwise noted, content on this site is licensed under a Creative Commons Attribution 3.0 Unported License.

Copyright 2015-present Hoti