Skip to main content

Grokability Snipe-IT 8.0.4 - Insecure Direct Object Reference (IDOR)

Medium
Exploitwebexploit
Published: Tue May 06 2025 (05/06/2025, 00:00:00 UTC)
Source: Exploit-DB RSS Feed

Description

Grokability Snipe-IT 8.0.4 - Insecure Direct Object Reference (IDOR)

AI-Powered Analysis

AILast updated: 06/11/2025, 21:12:10 UTC

Technical Analysis

The Grokability Snipe-IT 8.0.4 application suffers from an Insecure Direct Object Reference (IDOR) vulnerability identified as CVE-2025-47226. This vulnerability exists in the `/locations/<id>/printassigned` endpoint, which is used to display asset assignment data for a specific location. The flaw allows an authenticated user with low privileges assigned to one location to manipulate the `location_id` parameter in the URL and access asset assignment information belonging to other locations or departments within the same organization. This occurs because the application fails to properly enforce access control checks on the `location_id` parameter, allowing unauthorized disclosure of sensitive internal data such as asset IDs, assignee details, and location metadata. The vulnerability was tested on a typical LAMP stack environment (Ubuntu 22.04 LTS, Apache2, MySQL, PHP 8.1) and affects all versions up to and including 8.0.4. The issue was addressed in Snipe-IT version 8.1.0, which includes corrected access control validation. The exploit code demonstrates how an authenticated user can simply modify the URL to retrieve data from unauthorized locations, highlighting the ease of exploitation. This vulnerability does not require elevated privileges beyond a low-privileged authenticated user, but it does require authentication and no user interaction beyond URL manipulation. The impact is primarily unauthorized disclosure of internal asset and inventory information across departments, potentially leading to lateral data exposure within an organization. No known exploits are reported in the wild yet, but the presence of public exploit code increases the risk of exploitation.

Potential Impact

For European organizations, the impact of this vulnerability is significant in environments where Snipe-IT is used for asset management, particularly in medium to large enterprises with multiple departments or locations. Unauthorized access to asset assignment data can lead to information leakage about internal inventory, potentially exposing sensitive operational details or enabling further targeted attacks. This lateral data exposure undermines confidentiality and could facilitate social engineering or insider threats. Organizations in regulated sectors such as finance, healthcare, or government may face compliance risks due to unauthorized data disclosure. While the vulnerability does not directly impact system integrity or availability, the breach of confidentiality alone can have reputational and operational consequences. Since Snipe-IT is an open-source asset management tool widely adopted in IT asset management across Europe, organizations relying on versions <= 8.0.4 are at risk until patched. The lack of known active exploitation provides a window for mitigation, but the availability of exploit code increases urgency for remediation.

Mitigation Recommendations

European organizations should prioritize upgrading Snipe-IT installations to version 8.1.0 or later, where the access control flaw has been fixed. Until upgrades can be performed, organizations should implement strict network segmentation and access controls to limit authenticated user access to only necessary locations. Monitoring and logging access to the `/locations/<id>/printassigned` endpoint should be enhanced to detect unusual access patterns or attempts to access unauthorized location IDs. Additionally, organizations can implement web application firewall (WAF) rules to detect and block suspicious URL parameter tampering targeting the `location_id` parameter. Conducting internal audits of user permissions and enforcing the principle of least privilege will reduce the risk of exploitation. Finally, organizations should review their asset management policies and train users to recognize and report suspicious behavior related to asset data access.

Need more detailed analysis?Get Pro

Technical Details

Edb Id
52282
Has Exploit Code
true
Code Language
text

Indicators of Compromise

Exploit Source Code

Exploit Code

Exploit code for Grokability Snipe-IT 8.0.4 - Insecure Direct Object Reference (IDOR)

# Exploit Title: Grokability Snipe-IT 8.0.4 - Insecure Direct Object Reference (IDOR)
# Google Dork: N/A
# Date: 2025-05-02
# Exploit Author: Sn1p3r-H4ck3r (Siripong Jintung)
# Vendor Homepage: https://snipeitapp.com
# Software Link: https://github.com/grokability/snipe-it
# Version: <= 8.0.4
# Tested on: Ubuntu 22.04 LTS, Apache2 + MySQL + PHP 8.1
# CVE: CVE-2025-47226

# Vulnerability Description:
Snipe-IT <= 8.0.4 contains an Insecure Direct Object Reference (IDOR) vulnerability in the
`/loca
... (1146 more characters)
Code Length: 1,646 characters

Threat ID: 68489e1b7e6d765d51d53eef

Added to database: 6/10/2025, 9:05:31 PM

Last enriched: 6/11/2025, 9:12:10 PM

Last updated: 8/14/2025, 6:42:58 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats