CVE-2022-34002 Personnel Data Systems (PDS) Vista 7 - Local File Inclusion

Summary

Name Personnel Data Systems (PDS) Vista 7 - Local File Inclusion
Product PDS Vista 7
Affected Versions <7.1.7.2 – External Applicants Security Hotfix – XA Clients Only
State Public
Release Date 2022/08/08

Vulnerability

Type Local File Inclusion
Rule CWE-22 - Improper Limitation of a Pathname to a Restricted Directory https://cwe.mitre.org/data/definitions/22.html
Remote? Yes
Authentication Required? Yes
CVSS v3 Vector AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
CVSS v3 Base Score 7.7
Exploit Available? No, but manually exploitable
CVE ID(s) https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34002

Description

The ‘document’ parameter of PDS Vista 7’s /application/documents/display.aspx page is vulnerable to a Local File Inclusion vulnerability which allows an low-privileged authenticated attacker to leak the configuration files and source code of the web application.

Proof-of-Concept

The implementation of PDS Vista 7 may vary by organization so the following proof-of-concept may not follow the same flow as other client implementations. The situation in which Assura discovered this vulnerability, the client had implemented PDS Vista 7 to accept applications for job positions. This required the creation of an account by a job application which exposed the vulnerable function.

  • Proxy a browser in Burp Suite or another web browser proxying tool.
  • Log into the system that implements PDS Vista 7 prior to the application of the patch ‘7.1.7.2 – External Applicants Security Hotfix – XA Clients Only’.
  • Navigate to the /application/documents/display.aspx?document= page.
    • At this point, the page should return a 200 OK code but the page itself will be blank in the web browser.

  • Add the value ‘/web.config’ to the document parameter and request the page again. See that this time we receive a response with encrypted content. This is where the vulnerability gets interesting.

  • In Burp Suite, find the request/response pair for the /application/documents/display.aspx?document=/web.config request.
    • In the response body, search for the string ‘padDiv’. Within the ‘padDiv’ section of the response body, we can see the unencrypted contents of the file requested.

  • This vulnerability can be used to retrieve any file contents within the root or sub-directories of the web application but not system level or above-root level files.

Exploit

There is no pre-packaged exploit for this vulnerability at this time although it can be easily exploited manually as shown in the Proof-of-Concept section above.

Mitigation

Customers should apply the following patch - ‘7.1.7.2 – External Applicants Security Hotfix – XA Clients Only’

Credits

This vulnerability was discovered by Nick Berrie (https://www.linkedin.com/in/nick-berrie/), Technical Director of Assura’s Offensive Security Operations department at Assura, Inc.

References

Vendor Page https://www.pdssoftware.com/Solutions/VistaOverview.asp
CVE Description https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34002

Timeline

  • 2022-04-27: Vulnerability discovered 
  • 2022-04-27: Vendor contacted
  • 2022-06-19: CVE #s issued by MITRE
  • 2022-04-29: Vendor confirmed patch
  • 2022-08-08: Public disclosure

Previous
Previous

Red Team Tactics - "Loiding" A Door

Next
Next

CVE-2022-26959 Northstar Club Management software version 6.3 - Full, Blind/Time-based SQL Injection