CVE-2022-34002 Personnel Data Systems (PDS) Vista 7 - Local File Inclusion
Summary
Name | Personnel Data Systems (PDS) Vista 7 - Local File Inclusion |
Product | PDS Vista 7 |
Affected Versions | <7.1.7.2 – External Applicants Security Hotfix – XA Clients Only |
State | Public |
Release Date | 2022/08/08 |
Vulnerability
Type | Local File Inclusion |
Rule | CWE-22 - Improper Limitation of a Pathname to a Restricted Directory https://cwe.mitre.org/data/definitions/22.html |
Remote? | Yes |
Authentication Required? | Yes |
CVSS v3 Vector | AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N |
CVSS v3 Base Score | 7.7 |
Exploit Available? | No, but manually exploitable |
CVE ID(s) | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34002 |
Description
The ‘document’ parameter of PDS Vista 7’s /application/documents/display.aspx page is vulnerable to a Local File Inclusion vulnerability which allows an low-privileged authenticated attacker to leak the configuration files and source code of the web application.
Proof-of-Concept
The implementation of PDS Vista 7 may vary by organization so the following proof-of-concept may not follow the same flow as other client implementations. The situation in which Assura discovered this vulnerability, the client had implemented PDS Vista 7 to accept applications for job positions. This required the creation of an account by a job application which exposed the vulnerable function.
- Proxy a browser in Burp Suite or another web browser proxying tool.
- Log into the system that implements PDS Vista 7 prior to the application of the patch ‘7.1.7.2 – External Applicants Security Hotfix – XA Clients Only’.
- Navigate to the /application/documents/display.aspx?document= page.
- At this point, the page should return a 200 OK code but the page itself will be blank in the web browser.
- Add the value ‘/web.config’ to the document parameter and request the page again. See that this time we receive a response with encrypted content. This is where the vulnerability gets interesting.
- In Burp Suite, find the request/response pair for the /application/documents/display.aspx?document=/web.config request.
- In the response body, search for the string ‘padDiv’. Within the ‘padDiv’ section of the response body, we can see the unencrypted contents of the file requested.
- This vulnerability can be used to retrieve any file contents within the root or sub-directories of the web application but not system level or above-root level files.
Exploit
There is no pre-packaged exploit for this vulnerability at this time although it can be easily exploited manually as shown in the Proof-of-Concept section above.
Mitigation
Customers should apply the following patch - ‘7.1.7.2 – External Applicants Security Hotfix – XA Clients Only’
Credits
This vulnerability was discovered by Nick Berrie (https://www.linkedin.com/in/nick-berrie/), Technical Director of Assura’s Offensive Security Operations department at Assura, Inc.
References
Vendor Page | https://www.pdssoftware.com/Solutions/VistaOverview.asp |
CVE Description | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34002 |
Timeline
- 2022-04-27: Vulnerability discovered
- 2022-04-27: Vendor contacted
- 2022-06-19: CVE #s issued by MITRE
- 2022-04-29: Vendor confirmed patch
- 2022-08-08: Public disclosure