Ardent Security Advisory
Ardent Security regularly identifies zero-day vulnerabilities and exploits in various products. We believe in responsible disclosure.
#####################################################################################
#
# Ardent Security Advisory
# Original Disclosure: https://www.ardent-security.com/advisory/ASA-2021-02/ASA-2021-02_CVE-2021-29394.txt
#
#####################################################################################
#
# Product: NorthStar Club Management 6.3
# Vendor: Northstar Technologies Inc
# URL: https://www.globalnorthstar.com/
# ASA ID: ASA-2021-02
# CVE ID: CVE-2021-29394
#CWE ID: CWE-620 – Unverified Password Change
# Subject: Account Hijacking via Arbitrary User Password Change
# Severity: High
# Author: Alexandre LaRocque, CEO <[email protected]>
# Date: 2022-01-27
#
#####################################################################################
Description:
In the NorthStar Club Management 6.3 web application, as a low-privilege user (e.g., Front-Desk or Concierge user),it is possible to change the password of any user, including high-privilege administrators, of the NorthStar web application. Any compromised NorthStar account can then be used by an attacker to escalate their privileges by changing the password of an administrator user. The access control checks on the “userID” parameter are insufficient. This vulnerability was identified by Ardent Security experts while performing penetration testing in Toronto, Canada.
Technical Description:
Due to the dominant market share of the product, no proof-of-concept code is provided.
Affected version(s):
Only NorthStar Club Management 6.3 was tested. Older versions could be vulnerable.
Workaround / Fix:
It is unknown if this vulnerability has been fixed by the vendor.
Vulnerability Severity:
CVSS v3.1 Metrics [2]:
– CVSS Base Score: 10 (High)
– CVSS Vector: AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H
Timeline:
2021-03-18: Vulnerability discovery
2021-03-27: Contacted vendor about the vulnerability
2021-03-27: Vendor was given a 90-days period
2021-06-27: Vendor was given an additional 90-days period
2021-09-27: Vendor was given an additional 90-days period
2022-01-26: Public disclosure
References:
[1] https://www.ardent-security.com/advisory/ASA-2021-02
[2] https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H&version=3.1