Search

Penetration
Testing

AIT-SA-20240514-03

FIWARE Keyrock: Activation of any new user

Identifier: AIT-SA-20240514-03
Target: FIWARE Keyrock
Vendor: FIWARE
Version: all versions including 8.4
CVE: CVE-2024-42165
Accessibility: Remote
Severity: Medium (6.3)
Author: Wolfgang Hotwagner (Austrian Institute of Technology)

SUMMARY

Insufficiently random values for generating activation token in all versions of FIWARE Keyrock including 8.4 allow attackers to activate accounts of any user by predicting the token for the activation link.

Proof of Concept

The algorithm that is used to create the activation token for user, is predictable. An attacker could predict multiple future “random” numbers and activate any new user:

The route to /activate is unauthenticated:

An authenticated non-admin user can create multiple password-reset-token and predict multiple future random keys and use them to activate new users.

For further information see “Manipulate passwords of any user”

VULNERABLE VERSIONS

All versions including 8.4 are affected.

TESTED VERSIONS

FIWARE Keyrock 8.4

IMPACT

An authenticated user can use the password reset token to predict the random number. Using the predicted number the attacker might be able to activate any new user.

MITIGATION

Currently (August 12th, 2024) there is no known mitigation.

VENDOR CONTACT TIMELINE

WOLFGANG HOTWAGNER

Research Engineer /
Security & Communication Technologies