OpenAsset Digital Asset Management IP Access Control Bypass

CVE Category Price Severity
CVE-2020-28856 CWE-264 Not specified High
Author Risk Exploitation Type Date
Unknown High Remote 2020-12-14
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at:

Below is a copy:

OpenAsset Digital Asset Management IP Access Control Bypass
Title: IP access control bypass


Product: OpenAsset Digital Asset Management by OpenAsset


Vendor Homepage:


Vulnerable Version: 12.0.19 (Cloud) 11.2.1 (On-premise)


Fixed Version: 12.0.20 (Cloud) 11.4.10 (On-premise)


CVE Number: CVE-2020-28856


Author: Jack Misiura from The Missing Link 






2020-11-14 Disclosed to Vendor

2020-12-04 Vendor releases final patches

2020-12-10 Publication


1. Vulnerability Description


The OpenAsset Digital Asset Management web application allowed for spoofing of IP addresses by using X-Forwarded-For header. By default, the web application would allow all traffic in for, in order to prevent users from accidentally blocking themselves.


2. PoC


Ensure a web application endpoint has been blocked for a specific IP address or alternatively, use a * to block all IP address. Confirm the block is in place by attempting to make a request to the endpoint. Next, add the following to the request header:




The request will not be blocked, allowing access to potentially dangerous endpoints or sensitive data.


3. Solution


The vendor provides an updated version (11.4.10) which should be installed immediately. If using the cloud version, the vendor has already updated it.


4. Advisory URL

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum