Grokability Snipe-IT 8.0.4 - Insecure Direct Object Reference (IDOR)
Grokability Snipe-IT 8.0.4 - Insecure Direct Object Reference (IDOR)
AI Analysis
Technical Summary
The Grokability Snipe-IT 8.0.4 application suffers from an Insecure Direct Object Reference (IDOR) vulnerability identified as CVE-2025-47226. This vulnerability exists in the `/locations/<id>/printassigned` endpoint, which is used to display asset assignment data for a specific location. The flaw allows an authenticated user with low privileges assigned to one location to manipulate the `location_id` parameter in the URL and access asset assignment information belonging to other locations or departments within the same organization. This occurs because the application fails to properly enforce access control checks on the `location_id` parameter, allowing unauthorized disclosure of sensitive internal data such as asset IDs, assignee details, and location metadata. The vulnerability was tested on a typical LAMP stack environment (Ubuntu 22.04 LTS, Apache2, MySQL, PHP 8.1) and affects all versions up to and including 8.0.4. The issue was addressed in Snipe-IT version 8.1.0, which includes corrected access control validation. The exploit code demonstrates how an authenticated user can simply modify the URL to retrieve data from unauthorized locations, highlighting the ease of exploitation. This vulnerability does not require elevated privileges beyond a low-privileged authenticated user, but it does require authentication and no user interaction beyond URL manipulation. The impact is primarily unauthorized disclosure of internal asset and inventory information across departments, potentially leading to lateral data exposure within an organization. No known exploits are reported in the wild yet, but the presence of public exploit code increases the risk of exploitation.
Potential Impact
For European organizations, the impact of this vulnerability is significant in environments where Snipe-IT is used for asset management, particularly in medium to large enterprises with multiple departments or locations. Unauthorized access to asset assignment data can lead to information leakage about internal inventory, potentially exposing sensitive operational details or enabling further targeted attacks. This lateral data exposure undermines confidentiality and could facilitate social engineering or insider threats. Organizations in regulated sectors such as finance, healthcare, or government may face compliance risks due to unauthorized data disclosure. While the vulnerability does not directly impact system integrity or availability, the breach of confidentiality alone can have reputational and operational consequences. Since Snipe-IT is an open-source asset management tool widely adopted in IT asset management across Europe, organizations relying on versions <= 8.0.4 are at risk until patched. The lack of known active exploitation provides a window for mitigation, but the availability of exploit code increases urgency for remediation.
Mitigation Recommendations
European organizations should prioritize upgrading Snipe-IT installations to version 8.1.0 or later, where the access control flaw has been fixed. Until upgrades can be performed, organizations should implement strict network segmentation and access controls to limit authenticated user access to only necessary locations. Monitoring and logging access to the `/locations/<id>/printassigned` endpoint should be enhanced to detect unusual access patterns or attempts to access unauthorized location IDs. Additionally, organizations can implement web application firewall (WAF) rules to detect and block suspicious URL parameter tampering targeting the `location_id` parameter. Conducting internal audits of user permissions and enforcing the principle of least privilege will reduce the risk of exploitation. Finally, organizations should review their asset management policies and train users to recognize and report suspicious behavior related to asset data access.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Belgium, Italy, Spain
Indicators of Compromise
- exploit-code: # Exploit Title: Grokability Snipe-IT 8.0.4 - Insecure Direct Object Reference (IDOR) # Google Dork: N/A # Date: 2025-05-02 # Exploit Author: Sn1p3r-H4ck3r (Siripong Jintung) # Vendor Homepage: https://snipeitapp.com # Software Link: https://github.com/grokability/snipe-it # Version: <= 8.0.4 # Tested on: Ubuntu 22.04 LTS, Apache2 + MySQL + PHP 8.1 # CVE: CVE-2025-47226 # Vulnerability Description: Snipe-IT <= 8.0.4 contains an Insecure Direct Object Reference (IDOR) vulnerability in the `/locations/<id>/printassigned` endpoint. This flaw allows an authenticated user from one department to gain access to asset assignment data belonging to other departments by modifying the `location_id` in the URL. # Steps to Reproduce: 1. Authenticate with a low-privileged account assigned to `location_id = 2`. 2. Access the print preview page: https://<target>/locations/2/printassigned 3. Modify the URL to: https://<target>/locations/1/printassigned 4. The application will disclose inventory/assignment information for location ID 1, even if the user should not have access. # Impact: - Unauthorized access to internal asset and inventory information. - Potential for lateral data exposure between departments in the same organization. - Disclosure of asset IDs, assignees, and location metadata. # Mitigation: Update to **Snipe-IT v8.1.0** or higher where access control validation has been corrected. # References: - Patch PR: https://github.com/grokability/snipe-it/pull/16672 - CVE Record: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47226 - Release Notes: https://github.com/grokability/snipe-it/releases/tag/v8.1.0
Grokability Snipe-IT 8.0.4 - Insecure Direct Object Reference (IDOR)
Description
Grokability Snipe-IT 8.0.4 - Insecure Direct Object Reference (IDOR)
AI-Powered Analysis
Technical Analysis
The Grokability Snipe-IT 8.0.4 application suffers from an Insecure Direct Object Reference (IDOR) vulnerability identified as CVE-2025-47226. This vulnerability exists in the `/locations/<id>/printassigned` endpoint, which is used to display asset assignment data for a specific location. The flaw allows an authenticated user with low privileges assigned to one location to manipulate the `location_id` parameter in the URL and access asset assignment information belonging to other locations or departments within the same organization. This occurs because the application fails to properly enforce access control checks on the `location_id` parameter, allowing unauthorized disclosure of sensitive internal data such as asset IDs, assignee details, and location metadata. The vulnerability was tested on a typical LAMP stack environment (Ubuntu 22.04 LTS, Apache2, MySQL, PHP 8.1) and affects all versions up to and including 8.0.4. The issue was addressed in Snipe-IT version 8.1.0, which includes corrected access control validation. The exploit code demonstrates how an authenticated user can simply modify the URL to retrieve data from unauthorized locations, highlighting the ease of exploitation. This vulnerability does not require elevated privileges beyond a low-privileged authenticated user, but it does require authentication and no user interaction beyond URL manipulation. The impact is primarily unauthorized disclosure of internal asset and inventory information across departments, potentially leading to lateral data exposure within an organization. No known exploits are reported in the wild yet, but the presence of public exploit code increases the risk of exploitation.
Potential Impact
For European organizations, the impact of this vulnerability is significant in environments where Snipe-IT is used for asset management, particularly in medium to large enterprises with multiple departments or locations. Unauthorized access to asset assignment data can lead to information leakage about internal inventory, potentially exposing sensitive operational details or enabling further targeted attacks. This lateral data exposure undermines confidentiality and could facilitate social engineering or insider threats. Organizations in regulated sectors such as finance, healthcare, or government may face compliance risks due to unauthorized data disclosure. While the vulnerability does not directly impact system integrity or availability, the breach of confidentiality alone can have reputational and operational consequences. Since Snipe-IT is an open-source asset management tool widely adopted in IT asset management across Europe, organizations relying on versions <= 8.0.4 are at risk until patched. The lack of known active exploitation provides a window for mitigation, but the availability of exploit code increases urgency for remediation.
Mitigation Recommendations
European organizations should prioritize upgrading Snipe-IT installations to version 8.1.0 or later, where the access control flaw has been fixed. Until upgrades can be performed, organizations should implement strict network segmentation and access controls to limit authenticated user access to only necessary locations. Monitoring and logging access to the `/locations/<id>/printassigned` endpoint should be enhanced to detect unusual access patterns or attempts to access unauthorized location IDs. Additionally, organizations can implement web application firewall (WAF) rules to detect and block suspicious URL parameter tampering targeting the `location_id` parameter. Conducting internal audits of user permissions and enforcing the principle of least privilege will reduce the risk of exploitation. Finally, organizations should review their asset management policies and train users to recognize and report suspicious behavior related to asset data access.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Edb Id
- 52282
- Has Exploit Code
- true
- Code Language
- text
Indicators of Compromise
Exploit Source Code
Exploit code for Grokability Snipe-IT 8.0.4 - Insecure Direct Object Reference (IDOR)
# Exploit Title: Grokability Snipe-IT 8.0.4 - Insecure Direct Object Reference (IDOR) # Google Dork: N/A # Date: 2025-05-02 # Exploit Author: Sn1p3r-H4ck3r (Siripong Jintung) # Vendor Homepage: https://snipeitapp.com # Software Link: https://github.com/grokability/snipe-it # Version: <= 8.0.4 # Tested on: Ubuntu 22.04 LTS, Apache2 + MySQL + PHP 8.1 # CVE: CVE-2025-47226 # Vulnerability Description: Snipe-IT <= 8.0.4 contains an Insecure Direct Object Reference (IDOR) vulnerability in the `/loca
... (1146 more characters)
Threat ID: 68489e1b7e6d765d51d53eef
Added to database: 6/10/2025, 9:05:31 PM
Last enriched: 6/11/2025, 9:12:10 PM
Last updated: 8/14/2025, 6:42:58 PM
Views: 14
Related Threats
U.S. CISA adds N-able N-Central flaws to its Known Exploited Vulnerabilities catalog - Security Affairs
MediumU.S. CISA adds Microsoft Internet Explorer, Microsoft Office Excel, and WinRAR flaws to its Known Exploited Vulnerabilities catalog
MediumCisco ISE 3.0 - Remote Code Execution (RCE)
CriticalCisco ISE 3.0 - Authorization Bypass
Mediumprojectworlds Online Admission System 1.0 - SQL Injection
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.