Ava-327: Insufficient authorization of timeline requests by Ava Aware guest users

Release Date

2nd December 2020.

Overview

Users that accessed Ava Aware through a shared link could retrieve timeline information they were not permitted to view using the API. The information that an attacker could access was limited to the time ranges that had been shared for at least one camera in the shared link and was limited to the cameras that were shared in the shared link. In the following examples t1, t2, t3, and t4 are timestamps where t1 < t2 < t3 < t4. Example A: if the time range t1 to t2 was shared for camera C1 and the time range t3 to t4 was shared for camera C2, then the time ranges t1 to t2 and t3 to t4 would be accessible for both C1 and C2. Example B: if the time range t1 to t3 was shared for camera C1 and the time range t2 to t4 was shared for camera C2 then the time range t1 to t4 would be accessible for both C1 and C2.

Affected Products

  • Ava Aware:
  • All Stable Upgrade Channel versions before 3.2.3.
  • All Beta Upgrade Channel versions before 3.2.3.

Unaffected Products

  • Ava Aware:
  • All Stable Upgrade Channel versions after and including 3.2.3.
  • All Beta Upgrade Channel versions after and including 3.2.3.
  • Ava cameras: All versions
  • Ava Cloud: All versions

Resolution

This issue has been fixed in Ava Aware Beta upgrade channel version 3.2.3 and Stable upgrade channel version 3.2.3. We recommend that all installations running an affected version upgrade to the latest release as soon as possible. Releases are available to download through the Ava Aware User Interface.

Vulnerability Information

Mitigations

There are no known mitigations for this issue.

Work arounds

The work around for this issue is to only share one camera per shared link.

Acknowledgements

Issue found internally by Ava Security.

Disclosure Timeline

  • 19/11/2020 Issue found internally by Ava Security
  • 19/11/2020 Root cause established
  • 01/12/2020 Fix identified
  • 02/12/2020 Patched Ava Aware (Beta upgrade channel) released
  • 02/12/2020 Patched Ava Aware (Stable upgrade channel) released
  • 02/12/2020 Advisory published internally
  • 02/12/2020 Vulnerability publicly disclosed