CVE-2022-45183
Ironman Software PowerShell Universal vulnerability analysis and mitigation

Overview

Escalation of privileges vulnerability in the Web Server component of Ironman Software PowerShell Universal versions 2.x and 3.x was discovered. The vulnerability allows an attacker with a valid app token to retrieve other app tokens by ID via an HTTP web request, potentially leading to privilege escalation. The vulnerability was disclosed on November 11th, 2022, and affects versions 3.5.2 and earlier, 3.4.6 and earlier, and 2.12.5 and earlier (IronMan Blog).

Technical details

The vulnerability stems from a logic error in the App Token endpoint that allows valid app tokens created by a single user to access any app token created by that same user. For example, if a user created a Reader app token, that token could access an administrator app token created by the same user, leading to privilege escalation. The vulnerability has a CVSS score of 8.8, indicating high severity (CISA Bulletin).

Impact

The vulnerability allows an attacker to escalate their privileges by accessing app tokens with higher privilege levels. For instance, a user with a Reader app token could potentially gain administrator privileges by accessing an administrator app token created by the same user. However, app tokens could not access tokens created by other users (IronMan Blog).

Mitigation and workarounds

The vulnerability has been patched in versions 3.5.3, 3.4.7, and 2.12.6. As a workaround, administrators can revoke app tokens that meet the vulnerability criteria to mitigate this vulnerability without patching. It is recommended to upgrade to the patched versions (IronMan Blog).

Community reactions

The vulnerability was responsibly disclosed by a customer through Ironman Software's Vulnerability Response Policy. Special acknowledgment was given to Thierry Viaccoz for reporting the issue (IronMan Blog).

Additional resources


SourceThis report was generated using AI

Related Ironman Software PowerShell Universal vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2024-50616HIGH8.8
  • Ironman Software PowerShell UniversalIronman Software PowerShell Universal
  • cpe:2.3:a:ironmansoftware:powershell_universal
NoYesOct 27, 2024
CVE-2023-49213HIGH8.8
  • Ironman Software PowerShell UniversalIronman Software PowerShell Universal
  • cpe:2.3:a:ironmansoftware:powershell_universal
NoYesNov 23, 2023
CVE-2022-45183HIGH8.8
  • Ironman Software PowerShell UniversalIronman Software PowerShell Universal
  • cpe:2.3:a:ironmansoftware:powershell_universal
NoYesNov 14, 2022
CVE-2022-45184HIGH7.2
  • Ironman Software PowerShell UniversalIronman Software PowerShell Universal
  • cpe:2.3:a:ironmansoftware:powershell_universal
NoYesNov 14, 2022

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management