Multiple Vulnerabilities in Feripro

written by Pius Walter
8 · 01 · 24

Abstract

This blog post outlines three vulnerabilities discovered in Feripro. These are:

  • An Incorrect Access Control vulnerability in the user management system (CVE-2024-41517), which allows viewing of administrative users and their privileges.
  • An Incorrect Access Control vulnerability in the statistics endpoint (CVE-2024-41518), which permits the export of statistics without the need to log in.
  • A Stored Cross-Site Scripting vulnerability (CVE-2024-41519) that enables malicious code to be injected and stored in the application and executed by the user.

Thanks to the manufacturer’s extremely rapid response, a fix was available on the same day the vulnerabilities were reported and was deployed to all customer systems immediately.

What is Feripro?

Feripro is a software solution designed to simplify the management of holiday programs. It automates tasks from registration to payment, reducing administrative stress and saving time. The platform offers features like customizable registration forms, multiple payment options, email notifications, and export functions for program booklets [1]. Feripro is used by over 400 municipalities and cities, handling sensitive data with a strong focus on data protection. It provides a user-friendly interface, continuous support, and is constantly improved based on user feedback [2].

Vulnerabilities in Feripro

This section details three significant vulnerabilities found in Feripro. The first, an Incorrect Access Control issue in the user management interface (CVE-2024-41517), allows unauthorized viewing of administrative users and their privileges. The second, another Incorrect Access Control problem in the statistics endpoint (CVE-2024-41518), permits the download of statistical data without logging in. The third vulnerability is a Stored Cross-Site Scripting (XSS) flaw (CVE-2024-41519) that enables JavaScript injection via the school input field during registration, leading to malicious code execution in the registration overview. Each vulnerability poses a risk to data security and system integrity.

Incorrect Access Control in User Management Interface (CVE-2024-41517)

The Incorrect Access Control vulnerability in Feripro allows unauthorized users to view all registered (administrative) users and their privileges without needing to log in. This security flaw exposes sensitive user information. Accessible via the path /admin/benutzer/institution/rechteverwaltung/uebersicht and identified as CVE-2024-41517, this issue compromises the confidentiality of the user management system, posing a risk to the security of the affected platforms.

Overview of the users including their privileges

Incorrect Access Control in Statistics Endpoint (CVE-2024-41518)

The Incorrect Access Control vulnerability in Feripro’s statistics endpoint allows attackers to download statistical data as an Excel file (XLSX) without needing to log in. Accessible via the path /admin/programm/<program_id>/export/statistics and identified as CVE-2024-41518, this flaw exposes statistical data to unauthorized users, posing a risk to data confidentiality.

Unprotected statistics endpoint

The following images display the contents of the Excel file downloaded exploiting the Incorrect Access Control vulnerability. They show detailed statistics, including the number of participants and registrations, along with information about the age and gender of the participants.

Stored XSS in Registration Overview (CVE-2024-41519)

The Stored Cross-Site Scripting (XSS) vulnerability in Feripro allows attackers to inject JavaScript via the school input field during registration. This malicious code is executed when viewing the registration overview of events. Identified as CVE-2024-41519, this flaw enables the execution of arbitrary scripts in the user’s browser, potentially leading to data theft, or other malicious activities.

The following images demonstrate the exploitation process of the stored XSS vulnerability. The first image shows how to select an event for registration, preparing for the injection of malicious JavaScript code in subsequent steps.

Event selection

The following image continue to demonstrate the exploitation process. The next step involves entering basic information such as the number of adults and children participating in the event.

Basic registration information

The next image shows the entry of personal information, including name, gender, and school. The school input field is vulnerable to stored XSS, allowing the injection of malicious JavaScript code.

Personal registration information

The following two images simply show the completion of the registration process and are included only for the sake of completeness.

The final two images show the execution of the injected JavaScript code in the registration overview, accessible via the path /admin/programm/<program_id>/zuordnung/veranstaltungen/<event_id>, demonstrating the impact of the stored XSS vulnerability.

Stored XSS in the event view

The last image is included to illustrate the interface behavior as a result.

Registered exploit dataset

The vulnerabilities were swiftly addressed by the manufacturer, with fixes made available on the same day the issues were reported. Throughout the process, the communication was both friendly and professional, ensuring a smooth and efficient resolution.

Links to further information


History and Updates

The process and how to contact the Feripro team is described below.

07/15/2024 10:14 MEST

Reporting the three vulnerabilities to Feripro. Request the CVEs from the MITRE Corporation and reporting the vulnerabilities to the BSI CERT for information.

07/15/2024 11:15 MEST

Confirmation of the three vulnerabilities by the manufacturer. The manufacturer has been able to reproduce them. A corresponding fix should be available soon.

07/17/2024 05:30 MEST

Feedback from Feripro that the vulnerabilities found have been fixed and have been rolled out to all customer systems since Monday afternoon (07/15/2024).

08/01/2024 10:00 MEST

Public Disclosure of the vulnerability.


References

[1] https://feripro.de/

[2] https://feripro.de/referenzen/


Pius Walter

Pius Walter

Related Posts

Nitrado – A terrifying testimonial

Nitrado – A terrifying testimonial

This blog post is a testimonial for Nitrado, which claims to be the world’s leading game server service provider. It deals with the very outdated software and runtime environments and the resulting vulnerabilities in the area of hosting and email.

XSS vulnerability on StudySmarter

XSS vulnerability on StudySmarter

This article describes a cross site scripting (XSS) attack that works on StudySmarter. StudySmarter is a learning platform for pupils and students. The web app offers the possibility to create flashcards and learn them via the website and corresponding apps.

Comments

0 Kommentare

Einen Kommentar abschicken

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert