Layton Helpbox 4.4.0 login Bypass

2012.10.27
Risk: Medium
Local: No
Remote: Yes
CWE: N/A


CVSS Base Score: 6.5/10
Impact Subscore: 6.4/10
Exploitability Subscore: 8/10
Exploit range: Remote
Attack complexity: Low
Authentication: Single time
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

Layton Helpbox 4.4.0 Login Bypass Vulnerability by Joseph Sheridan Summary Layton Technologies Helpbox product version 4.4.0 is vulnerable to a login bypass vulnerability. CVE number: CVE-2012-4974 Impact: High Vendor homepage: http://www.laytontechnology.com Vendor notified: 10/09/2012 Vendor response: This product has been replaced by 'ServiceDesk' but fixes may be available with valid support contracts. Credit: Joseph Sheridan of ReactionIS Affected Products Helpbox 4.4.0 Details The following cookies control the user's login session and can be trivially modified to login as admin or any other known username. The 'loggedinuserusergroup' can be set to 'administrator' to gain full privileges. loggedinenduser, loggedinendusername, loggedinuserusergroup (administrator), loggedinuser, loggedinusername Impact An attacker can login as any user he/she wishes and make arbitrary changes to the application data. Solution Layton advise upgrading to their newer 'ServiceDesk' product. However, if you have an active support contract, Layton may be able to provide fixes for you. About ReactionIS Reaction Information Security is a leading independent pen test consultancy specialising in delivering the highest quality security testing services including network pen testing and web application security testing. As a CESG CHECK Service Provider we are authorised to carry out penetration testing on classified government networks.

References:

http://www.laytontechnology.com


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top