DTE Axiom Mobile Solution 12.3.3 Information Disclosure

2012.09.08
Credit: Tomas Rzepka
Risk: Low
Local: No
Remote: Yes
CWE: CWE-264


Ogólna skala CVSS: 6.4/10
Znaczenie: 4.9/10
Łatwość wykorzystania: 10/10
Wymagany dostęp: Zdalny
Złożoność ataku: Niska
Autoryzacja: Nie wymagana
Wpływ na poufność: Częściowy
Wpływ na integralność: Częściowy
Wpływ na dostępność: Brak

Release date: 2012-09-06 Discovered by: Tomas Rzepka, Certezza AB, http://www.certezza.net Vendor: Advanced Productivity Software (http://www.aps-soft.com) Versions Affected: Versions prior 12.3.3 Type: Authentication Severity: High CVSS Base Score: 8.5 (AV:N/AC:L/Au:N/C:C/I:P/A:N) CVE: CVE-2012-2455 ---------------- Description ---------------- In a penetration test we discovered a security flaw in DTE Axiom Mobile Solution. The security vulnerability can cause customers loss of sensitive data, such as usernames, customer relations and projects. Advanced Productivity Software DTE Axiom has a server application that can be published on the Internet to give users of iPhone/iPad and Black Berry access to the time tracking system. User is deployed by enabling the feature on each user in the backend administration. The user gets an e-mail from the system which contains two links. One link to download the application (from Apple AppStore). The other link is to feed the smart phone application with configuration such as server address, username, database and registration ID (GUID). The application communicates with the server over HTTPS. Although the application has a registration ID to identify each device it is never used. By posting applicable HTTP parameters to the application server, anyone with knowledge how the application works can extract and alter information about users, customers, projects, etc., without being authenticated to the server. We only had access to an iPhone/iPad device so we could not test the Black Berry functionality and it does not use the same API. The security issue does not exist in the Black Berry API according to the vendor. ---------------- Mitigation ---------------- Vendor has released a new version (12.3.3) which fixes this specific issue. ---------------- Timeline ---------------- 2012-05-07: Vendor disclosures 2012-05-07: Vendor response 2012-09-04: Fix released 2012-09-06: Public disclosure

Referencje:

http://www.certezza.net


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top