{"description":"Trending threats, MITRE ATT\u0026CK coverage, and detection metadata — refreshed continuously.","feed_url":"https://feed.craftedsignal.io/vendors/kirby/","home_page_url":"https://feed.craftedsignal.io/","items":[{"_cs_actors":[],"_cs_cves":[],"_cs_exploited":false,"_cs_products":["cms (\u003c= 4.8.0)","cms (\u003e= 5.0.0, \u003c= 5.3.3)"],"_cs_severities":["high"],"_cs_tags":["authorization","privilege-escalation","web-application"],"_cs_type":"advisory","_cs_vendors":["Kirby"],"content_html":"\u003cp\u003eKirby CMS, a file-based content management system, has a missing authorization flaw that allows authenticated users to access sensitive site, user, and role information without the necessary permissions. This vulnerability affects installations where there are potentially untrusted authenticated users. The issue stems from the lack of permission settings controlling access to the site model, users, and user roles. Specifically, the permissions \u003ccode\u003esite.access\u003c/code\u003e, \u003ccode\u003euser.access\u003c/code\u003e, \u003ccode\u003eusers.access\u003c/code\u003e, \u003ccode\u003euser.list\u003c/code\u003e, and \u003ccode\u003eusers.list\u003c/code\u003e were missing. This vulnerability was reported by @HuajiHD and patched in Kirby versions 4.9.0 and 5.4.0. Sites that explicitly intend all authenticated users to have read access to all site, user, and role information are not affected.\u003c/p\u003e\n\u003ch2 id=\"attack-chain\"\u003eAttack Chain\u003c/h2\u003e\n\u003col\u003e\n\u003cli\u003eAn attacker obtains valid credentials for a user account with access to the Kirby Panel.\u003c/li\u003e\n\u003cli\u003eThe attacker authenticates to the Kirby Panel using their credentials.\u003c/li\u003e\n\u003cli\u003eThe attacker crafts a request to access the site model data. This could involve accessing specific API endpoints related to site configuration.\u003c/li\u003e\n\u003cli\u003eThe attacker sends a request to list all users within the Kirby CMS.\u003c/li\u003e\n\u003cli\u003eThe system, lacking proper authorization checks, returns the requested site model and user list data to the attacker.\u003c/li\u003e\n\u003cli\u003eThe attacker sends a request to list existing roles, their names, descriptions, and configured permissions.\u003c/li\u003e\n\u003cli\u003eThe system returns the requested role information, again bypassing intended permission restrictions.\u003c/li\u003e\n\u003cli\u003eThe attacker gains unauthorized knowledge of the site structure, user accounts, and role permissions, which can be used to escalate privileges or further compromise the system.\u003c/li\u003e\n\u003c/ol\u003e\n\u003ch2 id=\"impact\"\u003eImpact\u003c/h2\u003e\n\u003cp\u003eSuccessful exploitation of this vulnerability allows an attacker with low-privilege Panel access to enumerate users, roles, and site configurations. This information can be used to identify privileged accounts, understand the site\u0026rsquo;s structure, and potentially escalate privileges by exploiting other vulnerabilities or misconfigurations. This impacts all Kirby sites using versions \u0026lt;= 4.8.0 and versions \u0026gt;= 5.0.0 and \u0026lt;= 5.3.3 where authenticated users are not fully trusted.\u003c/p\u003e\n\u003ch2 id=\"recommendation\"\u003eRecommendation\u003c/h2\u003e\n\u003cul\u003e\n\u003cli\u003eUpgrade to Kirby version 4.9.0 or 5.4.0 or later to patch the vulnerability as described in the advisory.\u003c/li\u003e\n\u003cli\u003eReview user roles and permissions after upgrading to ensure appropriate access controls are in place.\u003c/li\u003e\n\u003cli\u003eMonitor web server logs for suspicious requests targeting user and role enumeration endpoints after deploying the below rules.\u003c/li\u003e\n\u003c/ul\u003e\n","date_modified":"2024-01-03T12:00:00Z","date_published":"2024-01-03T12:00:00Z","id":"/briefs/2024-01-kirby-auth-bypass/","summary":"Kirby CMS versions before 4.9.0 and between 5.0.0 and 5.3.3 contain a missing authorization vulnerability, allowing authenticated Panel users to access site model, user, and role information without proper permission checks, potentially leading to unauthorized information disclosure.","title":"Kirby CMS Missing Authorization Vulnerability","url":"https://feed.craftedsignal.io/briefs/2024-01-kirby-auth-bypass/"}],"language":"en","title":"CraftedSignal Threat Feed — Kirby","version":"https://jsonfeed.org/version/1.1"}