Casdoor Unauthenticated Access Scanner

This scanner detects the use of Casdoor Unauthenticated Access in digital assets. It checks for unauthorized SCIM operations, which can allow access to sensitive user management functionalities without authentication.

Short Info


Level

Critical

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 seconds

Time Interval

16 days 14 hours

Scan only one

Domain, Subdomain, IPv4

Toolbox

-

Casdoor is an open-source identity access management (IAM) platform used to manage user identities and access permissions across multiple applications. It is commonly deployed in enterprise environments where a unified and streamlined approach for handling user authentication is required. Casdoor allows for seamless integration with various applications, providing centralized user management and single sign-on capabilities. It is used by IT administrators, developers, and security teams to enhance security and usability across systems. The software supports various authentication protocols, including OAuth, SAML, and LDAP, making it versatile for different security needs. Casdoor is often found in environments where cross-domain identity management is needed, simplifying user lifecycle management and promoting efficient access control.

The vulnerability detected by this scanner pertains to the unauthenticated access to SCIM (System for Cross-domain Identity Management) operations within Casdoor. SCIM is a standard protocol used for automating the exchange of user identity information between systems, and unauthorized access could allow malicious actors to manipulate user data without proper credentials. This vulnerability could expose sensitive user management functionalities to attackers, enabling them to perform operations like viewing user lists, adding or modifying user information, and altering user access permissions. The exploitation of this vulnerability compromises the security model intended by SCIM, potentially leading to unauthorized access or privilege escalation. Identifying and resolving this vulnerability is critical to maintaining the integrity and security of user identity data in systems using Casdoor.

The technical details of this vulnerability lie in the improper handling of authentication mechanisms in the SCIM API endpoints. Specifically, endpoints such as `/scim/Users` are vulnerable, allowing HTTP GET and POST requests without proper authentication verification. This means that operations meant to be restricted to authenticated users can be executed by any attacker aware of these endpoints. The vulnerability includes exposure to user data retrieval (GET) and user data manipulation (POST), both of which could be leveraged by attackers to compromise the system. The presence of a `casdoor_session_id` in headers and certain response bodies, combined with a `200` status code, indicates successful unauthorized operations, providing attackers with confirmation of the exploitability of the vulnerability.

If exploited, this vulnerability could lead to a significant breach of sensitive user information and unauthorized control over user accounts. Malicious actors could perform unauthorized actions, such as creating, deleting, or modifying user accounts, potentially leading to privilege escalation. They could also extract sensitive data, leading to data breaches, identity theft, and other malicious activities. Organizations using Casdoor would face reputational damage, regulatory penalties, and operational disruption. It is crucial, therefore, to promptly identify and mitigate this vulnerability to prevent potential exploitation and enhance security postures.

Get started to protecting your digital assets