Description Preview
Overview
CVE-2020-26251 affects Open Zaak versions before 1.3.3. The vulnerability (CWE-346: Origin Validation Error) stems from an overly permissive CORS policy that allowed any origin to make requests to Open Zaak installations. This could potentially enable attackers to craft malicious websites that make cross-origin requests to known Open Zaak instances using the victim's browser. The vulnerability was particularly concerning because it affected production environments when it was only intended for development use on localhost. However, several security controls were in place that limited the actual exploitability of this vulnerability, including Same-Site cookie restrictions, authentication requirements for sensitive data access, disabled credentials in cross-origin requests, and CSRF protections.
Remediation
To remediate this vulnerability:
- Upgrade Open Zaak to version 1.3.3 or later, which disables CORS by default
- If CORS is required for specific use cases, explicitly configure it through environment variables with appropriate restrictions
- Ensure that only trusted origins are allowed in your CORS configuration
- Maintain other security controls such as Same-Site cookie policies and CSRF protections
- Review server logs for any suspicious cross-origin requests that may indicate attempted exploitation
For organizations unable to upgrade immediately, implementing strict CORS policies through web server configuration (like Apache or Nginx) can provide temporary mitigation.
References
- Open Zaak Changelog for version 1.3.3: https://github.com/open-zaak/open-zaak/blob/master/CHANGELOG.rst#133-2020-12-17
- Fix commit: https://github.com/open-zaak/open-zaak/commit/952269269f1b629fce9c94485f83ac13f31d6c46
- GitHub Security Advisory: https://github.com/open-zaak/open-zaak/security/advisories/GHSA-chhr-gxrg-64x7
- CWE-346: Origin Validation Error: https://cwe.mitre.org/data/definitions/346.html
- OWASP CORS guidance: https://owasp.org/www-community/attacks/CORS_OriginHeaderScrutiny
Industry ExposureMost to leastThis section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.
- Accommodation & Food ServicesAccommodation & Food Services
- Administrative, Support, Waste Management & Remediation ServicesAdministrative, Support, Waste Management & Remediation Services
- Agriculture, Forestry Fishing & HuntingAgriculture, Forestry Fishing & Hunting
- Arts, Entertainment & RecreationArts, Entertainment & Recreation
- ConstructionConstruction
- Educational ServicesEducational Services
- Finance and InsuranceFinance and Insurance
- Health Care & Social AssistanceHealth Care & Social Assistance
- InformationInformation
- Management of Companies & EnterprisesManagement of Companies & Enterprises
- ManufacturingManufacturing
- MiningMining
- Other Services (except Public Administration)Other Services (except Public Administration)
- Professional, Scientific, & Technical ServicesProfessional, Scientific, & Technical Services
- Public AdministrationPublic Administration
- Real Estate Rental & LeasingReal Estate Rental & Leasing
- Retail TradeRetail Trade
- Transportation & WarehousingTransportation & Warehousing
- UtilitiesUtilities
- Wholesale TradeWholesale Trade