Cythera Cyber Security

Multiple Security Weaknesses in perfSONAR Detected

A combined Server-Side Request Forgery and Path Traversal vulnerability was discovered in Precisely Spectrum Spatial Analyst v2020.1.0 S44. These flaws could be chained to bypass authentication mechanisms in the interactive mapping application.
Talk to an expert

Introduction

Cythera uncovered both a Server-Side Request Forgery (SSRF) vulnerability and a Path Traversal flaw within Precisely’s Spectrum Spatial Analyst product. These weaknesses could allow an attacker to manipulate server-side requests and potentially access sensitive files or bypass authentication controls within the system.

The Vulnerability

Precisely Spectrum Spatial Analyst is a commercial mapping and analysis tool used to generate vector-based maps and location reports. As part of the broader Spectrum Spatial suite, it offers out-of-the-box functionality for geographic data processing, address lookups, and postcode-based information access. The application enables users to interact with location-based datasets through a visual interface designed for spatial analysis.

Server-Side Request Forgery

What is Server-Side Request Forgery?

Server-Side Request Forgery (SSRF) occurs when a threat actor tricks a server into making requests to unintended destinations. These requests often target internal systems that are not directly accessible from the internet, potentially exposing sensitive services or data.

Where was the SSRF Vulnerability Found?

This SSRF issue was identified in the endpoint responsible for proxying external tile services. Specifically, the endpoint accepted a URL parameter (REQUEST_URL) that was passed directly into the server-side application. This caused the application to make requests to attacker-controlled locations and return the associated responses.

Further details can be found under CVE-2022-42183 in the relevant security advisory.

Path Traversal Sequence Leading to Authentication Bypass

What is Path Traversal?

Path Traversal vulnerabilities enable unauthorised access to files and directories by manipulating file paths. These attacks often bypass intended access controls and allow retrieval of sensitive information.

Where was the Vulnerability Found?

Multiple endpoints were discovered to accept arbitrary URLs through a URL parameter. Rather than targeting static files, this attack used a traversal sequence to redirect requests to SOAP and REST API endpoints that were otherwise protected by Basic Authentication. By doing so, the attacker could bypass authentication and access sensitive API functionality.

This issue is documented under CVE-2022-42182, as noted in the vendor’s security advisory.

Vulnerability Disclosure Timeline

  • 19 August 2022 – Vendor acknowledged the vulnerabilities and confirmed they would be addressed in the next release.
  • 8 October 2022 – Version 2022.1.0 S06 released, containing the fixes.
  • 18 October 2022 – CVE identifiers CVE-2022-42182 and CVE-2022-42183 reserved.
  • 16 November 2022 – Public blog post published summarising the findings.


CIO
Government Agency
Cythera operates as an extension of our team. When we call there is an immediate response and the person that answers our call is the person that resolves our issue. Cythera understands our network, and more importantly, has taken the time to understand our business. We find it easy to work with Cythera. They are approachable, flexible and have taken the time to build deep relationships with our team. It is a partnership and friendship. Cythera’s personalised, highly specialised services makes all the difference. We would recommend Cythera to anyone in the industry looking for a managed services partner.
Expert methods

We have the tools to pinpoint risks

Whether it’s hidden vulnerabilities or patterns you might miss, we help you stay one step ahead and make confident, informed decisions. Understand how our services can help your business uncover critical risks

Talk to an expert
Employee Cyber Training & Awareness
Your people are your first line of defence. Our cyber training builds awareness sharpens instincts and turns everyday staff into assets.
Advisory
When clarity is critical and stakes are high, our advisory services deliver strategic, executive-level security expertise that empowers decision-making and resilient operations.