Ameeba Chat App store presentation

CVE-2024-55210: Bypassing Multi-Factor Authentication in TOTVS Framework

Ameeba’s Mission: Safeguarding privacy by securing data and communication with our patented anonymization technology.

Overview

CVE-2024-55210 is a critical vulnerability discovered in TOTVS Framework (Linha Protheus) version 12.1.2310. This vulnerability allows attackers to circumvent multi-factor authentication (MFA), a significant security feature designed to ensure an additional layer of authentication beyond the basic username and password. Given the high CVSS Severity Score of 9.8, the implications of this vulnerability are grave, potentially leading to system compromise or data leakage. Organizations using the affected TOTVS Framework need to understand the severity of this vulnerability, implement the necessary mitigation measures, and update their systems as promptly as possible.

Vulnerability Summary

CVE ID: CVE-2024-55210
Severity: Critical (9.8)
Attack Vector: Network
Privileges Required: Low
User Interaction: None
Impact: System compromise or data leakage

Affected Products

Ameeba Chat – The World’s Most Private Chat App
No phone number, email, or personal info required.

Product | Affected Versions

TOTVS Framework (Linha Protheus) | 12.1.2310

How the Exploit Works

The vulnerability resides in the websocket message handling of the TOTVS Framework. An attacker can craft a specific websocket message that, when processed by the affected system, can bypass the multi-factor authentication. This allows the attacker to gain unauthorized access to the system, potentially compromising the system or leaking sensitive data.

Conceptual Example Code

The following is a conceptual example of how the vulnerability might be exploited. This is a sample websocket message that contains a malicious payload:

GET /websocket/endpoint HTTP/1.1
Host: target.example.com
Upgrade: websocket
Connection: Upgrade
Sec-WebSocket-Key: x3JJHMbDL1EzLkh9GBhXDw==
Sec-WebSocket-Version: 13
{ "malicious_payload": "..." }

In this example, the attacker sends a crafted GET request over a websocket connection, carrying a malicious payload that can exploit the vulnerability and bypass the multi-factor authentication.

Mitigation Guidance

The primary mitigation measure for this vulnerability is to apply the vendor patch. TOTVS has released a patch to fix this vulnerability, and users are urged to apply this patch immediately. For organizations that cannot apply the patch immediately, using a Web Application Firewall (WAF) or Intrusion Detection System (IDS) can serve as a temporary mitigation measure. These systems can detect and block malicious websocket messages, thereby preventing the exploit.
However, these are only temporary solutions and cannot substitute for the permanent fix provided by the vendor patch. Therefore, all users should schedule to apply the vendor patch as soon as possible to secure their systems from this critical vulnerability.

Disclaimer:

The information and code presented in this article are provided for educational and defensive cybersecurity purposes only. Any conceptual or pseudocode examples are simplified representations intended to raise awareness and promote secure development and system configuration practices.

Do not use this information to attempt unauthorized access or exploit vulnerabilities on systems that you do not own or have explicit permission to test.

Ameeba and its authors do not endorse or condone malicious behavior and are not responsible for misuse of the content. Always follow ethical hacking guidelines, responsible disclosure practices, and local laws.

Ameeba Chat
The world’s most private
chat app

No phone number, email, or personal info required. Stay anonymous with encrypted messaging and customizable aliases.