Headline
CVE-2022-41708: relatedcode/Messenger 7bcd20b - Broken Access Control | Fluid Attacks
Relatedcode’s Messenger version 7bcd20b allows an authenticated external attacker to access existing chats in the workspaces of any user of the application. This is possible because the application does not validate permissions correctly.
Summary
Name
relatedcode/Messenger 7bcd20b - Broken Access Control
Code name
Tiesto
Product
relatedcode/Messenger
Affected versions
Version 7bcd20b
State
Public
Release date
2022-10-14
Vulnerability
Kind
Improper authorization control for web services
Rule
039. Improper authorization control for web services
Remote
Yes
CVSSv3 Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVSSv3 Base Score
6.5
Exploit available
Yes
CVE ID(s)
CVE-2022-41708
Description
Relatedcode/Messenger version 7bcd20b allows an authenticated external attacker to access existing chats in the workspaces of any user of the application. This is possible because the application does not validate permissions correctly.
Vulnerability
The application does not validate the application permissions correctly. Thanks to this we can access confidential information of any user registered on the server. Here we will see how an attacker manages to access the internal chats of the victim user:
Exploitation
To exploit this broken access control, one must first exploit another vulnerability present in the application. This vulnerability involves the disclosure of sensitive information.
Thanks to it I was able to gather the necessary data to be able to obtain the internal chat logs of other users of the application:
Impact
An authenticated remote attacker can access internal chat logs of arbitrary users of the application.
Our security police
We have reserved the CVE-2022-41708 to refer to this issue from now on.
- https://fluidattacks.com/advisories/policy/
System Information
Version: relatedcode/Messenger 7bcd20b
Operating System: GNU/Linux
Mitigation
There is currently no patch available for this vulnerability.
Credits
The vulnerability was discovered by Carlos Bello from the Offensive Team of Fluid Attacks.
References
Vendor page https://github.com/relatedcode/Messenger
Timeline
2022-09-23
Vulnerability discovered.
2022-09-23
Vendor contacted.
2022-09-23
Vendor replied acknowledging the report.
2022-09-23
Vendor Confirmed the vulnerability.
2022-10-14
Public Disclosure.