CVE-2023-43900: IDOR in EMSigner exposes confidential documents
IDOR vulnerability in EMSigner v2.8.7 (CVSS 6.5) letting attackers access other users' documents by tampering with the DocumentId and EncryptedDocumentId parameters.
Summary
Name: Insecure Object Reference Vulnerability in Web Application Document Handling.
Product: EMSigner
Affected versions: EMSigner v2.8.7
Affected Components: Endpoint /Areas/AdhocLogin/GETALLDOCUMENTSWORKDETAILSShareDownload with parameter "DocumentId"; and endpoint /Areas/Share/InternalUserCompletedDownload with parameter "ID".
Attack Type: Remote
Vulnerability Type: Incorrect Access Control
Impact: Information Disclosure
CVSSv3.1: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N — Base Score 6.5
CVE ID: CVE-2023-43900
Description
Insecure Direct Object References (IDOR) in EMSigner v2.8.7 allow attackers to gain unauthorized access to application content and view sensitive data of other users via manipulation of the documentID and EncryptedDocumentId parameters.
Vulnerability
The vulnerability stems from insecure handling of object references in the document-management functionality. The application permits unauthorized access to sensitive document data because it inadequately validates and controls access to specific parameters such as "DocumentID" and "EncryptedDocumentId".
Attack Vector
The flaw is exploited through IDOR by manipulating parameter values — particularly "documentID" and "EncryptedDocumentId". An attacker can reach application content and view sensitive data belonging to other users.
Exploitation
During a web-application assessment that used EMSigner we identified the following attack chain:
- Logged in as a low-privilege user and opened the document download option.
- The attacker intercepts the request
https://domain.com/Areas/AdhocLogin/GETALLDOCUMENTSWORKDETAILSShareDownload?WorkFlowID=&DocumentID=19and notices that the DocumentId parameter loads numbers sequentially. - Burp Suite Intruder is used to send values between 1 and 999 to the DocumentId parameter, enumerating existing documents.
- The server responses — especially larger ones — expose DocumentName and EncryptedDocumentId, revealing the document's name and encrypted identifier.
- Using that value, the attacker crafts the request
https://domain.com/Areas/Share/InternalUserCompletedDownload?ID=<EncryptedDocumentId>and downloads documents uploaded by any user.
Remediation
An updated version of EMSigner is available at the vendor page.
Credits
The vulnerability was discovered by Jean Paul Granados (SecPro).
References
Vendor page: https://www.emsigner.com/
Timeline
- 2023-02-27 — Vulnerability discovered.
- 2023-05-08 — Vendor contacted.
- 2023-05-24 — Vendor acknowledged the report.
- 2023-09-01 — Vulnerability patched.
- 2023-10-27 — Public disclosure.