Multiple Critical Vulnerabilities in CADClick

written by Pius Walter
10 · 04 · 24

Abstract

This blog post uncovers several critical vulnerabilities in the CADClick (by KiM GmbH Konstruktion & Internet im Maschinenbau) web application, a widely used digital platform for CAD products. The investigation identified several major security flaws, including:

  • A Path Traversal (Local File Inclusion, LFI) vulnerability (CVE-2024-41511).
  • A SQL Injection vulnerability (CVE-2024-41512).
  • Reflected Cross-Site Scripting vulnerabilities across multiple endpoints (CVE-2024-41513, CVE-2024-41514, CVE-2024-41515, CVE-2024-41516).

These findings highlight the urgent need for rigorous security testing and strong coding practices in web applications, especially those that handle sensitive data and critical functions. This post aims to raise awareness of the importance of proactive security measures in protecting digital assets and maintaining customer trust.

⚠️ Note on Unresolved Vulnerabilities

Unfortunately, not all vulnerabilities have been addressed by the manufacturer by the time of this blog post’s publication. Communication from the manufacturer has been completely absent, resulting in my messages being ignored. After 90 days, as previously announced to the manufacturer and the German Federal Office for Information Security (Bundesamt für Sicherheit in der Informationstechnik, BSI), this blog post has been published. This situation is an exception, as most manufacturers have been open to collaboration, allowing to address and resolve issues together effectively.

What is CADClick?

CADClick i.e. KiM GmbH Konstruktion & Internet im Maschinenbau is a comprehensive digital solution provider offering advanced tools for creating CAD product catalogs, configurators, and BIM technology. They specialize in data creation, UX/UI design, and 3D animation to enhance product visualization and customer experience. Their web application allows businesses to provide CAD products directly to customers, streamlining the design process, improving accuracy, and facilitating better communication between manufacturers and clients.

„CAD/BIM data can be generated worldwide in online or offline libraries and automatically created as 3D PDF data sheets.“

https://www.cadclick.de/en/solutions/cad-product-catalog/

Vulnerabilities in CADClick from KiM

Based on the „Success Stories“ from 67 companies listed on the developer’s website and additional sources, 32 companies have been identified as using this software and being vulnerable. However, it’s crucial to differentiate between the various software versions, as not all are susceptible to common XSS patterns. Additionally, patterns resembling zero-day vulnerabilities have been identified, affecting all versions without any available patch from the manufacturer.

Overview of the Customer-Used Versions of CADClick

The table below outlines the versions of CADClick and the associated libraries used by the identified customers. Following this, the vulnerabilities exploitable at various endpoints will be analyzed. In addition, potential attacks that can be actively executed will also be discussed.

CompanyCADClick
ccCatalog
BuildBranchccAPIStatistics
database
https://ace-cad.de/DEV 1.11.020231114.2master3.4.1.264261.72.0.0
https://cad.ags-automation.de/DEV 1.8.6 – Debug20210902.1master3.3.7.01.63.0.0
https://cad.alwitra.de/DEV 1.11.020240112.3master3.4.7.01.72.0.0
https://cad.baumueller.com/DEV 1.11.020230831.3master3.3.7.01.71.0.0
http://cad.br-automation.com/DEV 1.11.020231221.3master3.4.5.01.70.0.0
https://cad.pfaff-silberblau.com/DEV 1.8.6 – Debug20210916.1master3.3.6.01.60.0.0
https://cad.dunkermotoren.de/DEV 1.8.3 – Debug20190429.21.8.33.2.5.01.50.0.0
https://konfig.ernstschweizer.ch/DEV 1.8.3 – Debug19700101.13.2.5.01.45.0.0
https://cad.fischer.de/DEV 1.11.020231115.2master3.4.7.01.70.0.0
https://cad.georgfischer.com/DEV 1.11.020240123.1master3.2.5.01.70.0.0
https://teccad.hafele.com/DEV 1.9.0 – Debug20220908.3master3.4.4.285251.67.0.0
https://cadbox.heidenhain.de/REL 1.7.2.5 – Debug201805221450503.1.5.0n/a
https://cad.herborner-pumpen.de/kim/DEV 1.10.020230428.3master3.3.2.01.70.0.0
https://cad.hiwin.de/DEV 1.11.020231130.2master3.3.7.01.72.0.0
https://www.igus-cad.com/DEV 1.11.020240410.1master3.4.7.01.71.0.0
https://bimconfig.lamilux.de/DEV 1.10.020230420.1master3.3.7.01.70.0.0
https://cad.meusburger.com/DEV 1.11.020230901.1master3.4.3.01.70.0.0
https://cad.minitec.de/DEV 1.10.020230419.2master3.4.4.01.72.0.0
https://cad.murtfeldt.de/DEV 1.11.020240119.2master3.4.7.01.72.0.0
https://peraqua.cadclick.com/DEV 1.10.020230421.2master3.3.7.01.70.0.0
https://cad.poeppelmann.com/DEV 1.10.020230421.2master3.3.7.01.72.0.0
https://cad.reca.com/DEV 1.8.6 – Debug20220427.2master3.3.7.01.66.0.0
https://cad.sbn.de/DEV 1.6 – Debug201707261017023.1.5.0
https://cad.schoeck.de/DEV 1.11.020240318.1master3.4.5.01.72.0.0
https://cad.sitema.de/DEV 1.8.6 – Debug20210708.1master3.3.7.01.64.0.0
http://stabilus.cadclick.com/DEV 1.11.020230615.3master3.3.7.01.70.0.0
https://cad.phoenixcontact.com/DEV 1.8.6 – Debug20210413.2master3.4.4.0none
https://cad.tecnorm.de/DEV 1.11.020231019.1master3.4.5.01.70.0.0
https://konfigurator.tjiko.de/DEV 1.11.020231117.2master3.4.6.01.70.0.0
https://cad.wuerth.com/DEV 1.11.020240613.2master3.4.7.01.72.0.0
https://cad.vogel-antriebe.de/1.0.4577.42 – Debug2.8.19.69
https://cad.fittings.at/1.0.4801.6 – Debug2.8.19.69
Overview of the versions of CADClick used from 07/08/2024

Reflected XSS on Various Endpoints (CVE-2024-41513, CVE-2024-41514, CVE-2024-4151, CVE-2024-41516)

CADClick is developed in C# using the ASP.NET web application framework. The following endpoints have been identified as vulnerable to Reflected XSS attacks:

  • Artikel.aspx (parameter searchindex) (CVE-2024-41513)
  • PrevPgGroup.aspx (parameter wer) (CVE-2024-41514)
  • ccHandlerResource.ashx (parameter res_url) (CVE-2024-41515)
  • ccHandler.aspx (parameter bomid) (CVE-2024-41516)

The image below demonstrates the reflected XSS vulnerability on the Artikel.aspx endpoint. The payload <script>alert(location.hostname)</script> can be used to exploit this flaw. It’s important to note that this vulnerability is not present in all versions of CADClick.

Reflected XSS on the Artikel.aspx endpoint

The same vulnerability applies to the PrevPgGroup.aspx endpoint. The same payload, <script>alert(location.hostname)</script>, can be used here as well. However, like the previous example, this endpoint is only vulnerable in specific versions of CADClick.

Reflected XSS on the PrevPgGroup.aspx endpoint

The image below displays a version of CADClick that is not susceptible to the vulnerability. In this version, special characters such as <, >, (, ), ;, ', and " are automatically replaced with underscores (_), preventing the XSS exploit.

Fixed Reflected XSS on the PrevPgGroup.aspx endpoint

The ccHandlerResource.ashx endpoint, specifically with the parameter res_url is also vulnerable to Reflected XSS attacks.

Reflected XSS on the ccHandlerResource.ashx endpoint

The ccHandler.aspx endpoint is vulnerable to multiple security issues, including Reflected XSS and SQL Injection attacks. When accessed without parameters, it reveals available and vulnerable parameters, providing insight into potential exploitation points.

Loaded the ccHandler.aspx endpoint without parameters

Testing with the BoM ID using the guessed parameter bomid and a slightly adjusted payload proves successful. This demonstrates the endpoint’s vulnerability to the Reflected XSS attack.

Reflected XSS on the ccHandler.aspx endpoint

After confirming the pop-up window, an intriguing error message appeared. The space in the error message revealed the SVG, which was inserted with the payload. More notably, the error indicated a SQL syntax issue near the character '. This raises the possibility of an additional vulnerability in the application.

Via Reflected XSS loaded SVG on the ccHandler.aspx endpoint

SQL Injection Possibilities (CVE-2024-41512)

SQL Injection attacks are also effective. As noted earlier, this vulnerability impacts numerous customers. During an assessment of other clients, a case was found with extensive logging enabled. This logging not only displays the SQL query but also specifies the exact location of the error on the server, providing insights into the directory structure used. A closer examination reveals important details.

SQL error on the ccHandler.aspx endpoint

By appending the payload and 1=2 union all select concat_ws(0x3a,version(),user(),database()) to the previous URL, an error message was generated. This indicates that the SQL query was successfully appended to the original query.

Unfortunately, explicit output of information regarding the endpoints was not achievable at this time. It would be advisable for the manufacturer to conduct further investigation into this matter.

SQL Injection on the ccHandler.aspx endpoint

Path Traversal (Local File Inclusion) Vulnerability (CVE-2024-41511)

Subsequent examination of the web application aimed to identify additional endpoints where vulnerabilities might exist. This leads to the discovery of a Local File Inclusion (LFI) vulnerability, which can be exploited through the BinaryFileRedirector.ashx endpoint using the path parameter.

Web requests when loading the web application

When the request shown in the above screenshot is made, the specified image provided as a parameter is returned and subsequently downloaded by the web browser.

Download of an image using the BinaryFileRedirector.ashx endpoint

The next logical step involves attempting to access system files through the endpoint. This is illustrated below using the paths C:\Windows\win.ini and C:\Windows\system.ini. As demonstrated, this method allows for the reading of system files.

Access to system files via the BinaryFileredirector.ashx endpoint

At this point, it is concluded that further testing of the web application is unwarranted, at least until the manufacturer addresses and rectifies the known vulnerabilities across all endpoints. However, numerous indications suggest that the application harbors many other vulnerabilities, potentially including artificial ones, which could be exploited to compromise the underlying system for at least 32 customers.

What’s the Outcome?

The findings from this investigation underscore significant security risks associated with the CADClick web application, including multiple critical vulnerabilities. Despite attempts to engage with the manufacturer, no communication has been received, leaving some of these issues unresolved. The lack of response highlights a concerning trend in vulnerability management, emphasizing the necessity for proactive security measures in software development. It is imperative for developers to prioritize the identification and remediation of vulnerabilities to protect sensitive data and maintain user trust.

Additional Resources and References


History and Updates

The process and how to contact the CADClick team is described below.

07/05/2024 11:48 CEST

At the beginning, I identified only the XSS vulnerability and promptly notified the CADClick team via email.

07/08/2024 11:12 CEST

Over the weekend, I discovered additional vulnerabilities, including more XSS and LFI issues, as well as opportunities for SQL injections. On Monday, I highlighted the critical nature of these findings in another email.

07/11/2024 11:11 CEST

After not receiving a response to my email from CADClick, I took the initiative to find the managing director’s email address and wrote to him directly.

07/12/2024 12:34 CEST

After receiving no response from the manufacturer, I reported the vulnerabilities to the BSI CERT to facilitate communication with the manufacturer and coordinate the CVD process.

08/06/2024 10:15 CEST

There has still been no feedback from the manufacturer; however, numerous changes have been implemented in customer systems concerning IT security. The versioning remains inconsistent.

Further communication with the BSI CERT confirmed that no feedback has been received from the manufacturer on their end either. The BSI has followed up again and requested an evaluation by 08/14/2024.

08/13/2024 13:51 CEST

Feedback from BSI CERT indicated that the manufacturer has acknowledged the vulnerabilities and is actively working on their remediation. Processing is expected to be completed in the coming days, with updates to be communicated to customers as necessary. Additionally, the BSI has suggested that specific information be sent to me.

09/27/2024 12:21 CEST

I emailed BSI CERT, indicating that the vulnerabilities will be published on 10/04/2024, as previously communicated to the manufacturer on 07/08/2024. There has been no communication from the manufacturer since then.

10/04/2024 00:00 CEST

Public Disclosure of the vulnerabilities.

Yet there has still been no response from the manufacturer regarding the matter. Some of the vulnerabilities are still present in the customer systems.


Pius Walter

Pius Walter

Related Posts

Multiple Vulnerabilities in Feripro

Multiple Vulnerabilities in Feripro

This blog post describes three vulnerabilities in Feripro. These include two Incorrect Access Control vulnerabilities (CVE-2024-41517, CVE-2024-41518) and a Stored Cross-Site Scripting vulnerability (CVE-2024-41519). Feripro is a management software for vacation programs.

Nitrado – A terrifying testimonial

Nitrado – A terrifying testimonial

This blog post is a testimonial for Nitrado, which claims to be the world’s leading game server service provider. It deals with the very outdated software and runtime environments and the resulting vulnerabilities in the area of hosting and email.

Comments

0 Kommentare

Einen Kommentar abschicken

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert