Bhima 1.27.0 - Account Takeover via IDOR
7,6
High
Discovered by

Offensive Team, Fluid Attacks
Summary
Full name
Bhima 1.27.0 - Account Takeover via IDOR
Code name
State
Public
Release date
10 abr 2023
Affected product
Bhima
Affected version(s)
Version 1.27.0
Vulnerability name
Insecure object reference
Vulnerability type
Remotely exploitable
Yes
CVSS v3.1 vector string
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L
CVSS v3.1 base score
7.6
Exploit available
No
CVE ID(s)
Description
Bhima version 1.27.0 allows an authenticated attacker with regular user permissions to update arbitrary user session data such as username, email and password. This is possible because the application is vulnerable to IDOR, it does not correctly validate user permissions with respect to certain actions that can be performed by the user.
Vulnerability
This vulnerability occurs because the application is vulnerable to IDOR, it does not correctly validate user permissions with respect to certain actions that can be performed by the user.
Evidence of exploitation
A user with generic permissions can update the administrator session data through an IDOR.

A user with generic permissions can update the administrator password through an IDOR.

Here we can see that from the front end we cannot access any administrative interface to update user data (the administrator in our case).
However, this functionality is only hidden. If we send the request to update this data from an account with general permissions, we will not be stopped for lack of permissions.
This way we will be able to compromise any registered account from a general account (without administrator permissions clearly).

Our security policy
We have reserved the ID CVE-2023-0944 to refer to this issue from now on. Disclosure policy
System Information
Version: Bhima 1.27.0
Operating System: GNU/Linux
Mitigation
There is currently no patch available for this vulnerability.
References
Vendor page https://github.com/IMA-WorldHealth/bhima/
Timeline
IA generativa
21 feb 2023
Vendor contacted
21 feb 2023
Vendor replied
21 feb 2023
Public disclosure
10 abr 2023