Article Details

Scrape Timestamp (UTC): 2023-10-17 14:40:47.215

Source: https://thehackernews.com/2023/10/critical-vulnerabilities-uncovered-in.html

Original Article Text

Click to Toggle View

Critical Vulnerabilities Uncovered in Open Source CasaOS Cloud Software. Two critical security flaws discovered in the open-source CasaOS personal cloud software could be successfully exploited by attackers to achieve arbitrary code execution and take over susceptible systems. The vulnerabilities, tracked as CVE-2023-37265 and CVE-2023-37266, both carry a CVSS score of 9.8 out of a maximum of 10. Sonar security researcher Thomas Chauchefoin, who discovered the bugs, said they "allow attackers to get around authentication requirements and gain full access to the CasaOS dashboard." Even more troublingly, CasaOS' support for third-party applications could be weaponized to run arbitrary commands on the system to gain persistent access to the device or pivot into internal networks. Following responsible disclosure on July 3, 2023, the flaws were addressed in version 0.4.4 released by its maintainers IceWhale on July 14, 2023. A brief description of the two flaws is as follows - A consequence of successful exploitation of the aforementioned flaws could allow attackers to get around authentication restrictions and gain administrative privileges on vulnerable CasaOS instances. "In general, identifying IP addresses at the application layer is risk-prone and shouldn't be relied on for security decisions," Chauchefoin said. "Many different headers may transport this information (X-Forwarded-For, Forwarded, etc.), and the language APIs sometimes need to interpret nuances of the HTTP protocol the same way. Similarly, all frameworks have their own quirks and can be tricky to navigate without expert knowledge of these common security footguns."

Daily Brief Summary

CYBERCRIME // Security Flaws in Open-Source CasaOS Cloud Software Enable Unauthorised Code Execution

Two security flaws in open-source CasaOS personal cloud software have been identified, allowing attackers to execute arbitrary codes and take control of vulnerable systems.

The vulnerabilities, coded as CVE-2023-37265 and CVE-2023-37266 have a high-risk severity score of 9.8 out of a possible 10.

Security researcher, Thomas Chauchefoin, noted that the bugs could enable attackers to bypass authentication requirements and gain full access to CasaOS dashboard.

CasaOS' support for third-party applications can be misused to run random commands on the system, enabling persistent device access and intrusion into internal networks.

The vulnerabilities were responsibly reported and subsequently addressed in version 0.4.4 released by IceWhale on July 14, 2023.

Exploit of these flaws would allow attackers to circumvent authentication restrictions and gain administrative privileges on vulnerable systems.

The researcher highlighted the risks of relying on identifying IP addresses at the application layer, advising against using them for security decisions due to the potential for manipulation.