Layton Helpbox 4.4.0 Authorization Bypass

2012.10.27
Risk: High
Local: No
Remote: Yes
CWE: N/A


CVSS Base Score: 4/10
Impact Subscore: 2.9/10
Exploitability Subscore: 8/10
Exploit range: Remote
Attack complexity: Low
Authentication: Single time
Confidentiality impact: None
Integrity impact: Partial
Availability impact: None

Layton Helpbox 4.4.0 Authorisation Bypass Vulnerability by Joseph Sheridan Summary Layton Technologies Helpbox product version 4.4.0 is vulnerable to an authorisation bypass vulnerability. CVE number: CVE-2012-4975 Impact: Medium Vendor homepage: http://www.laytontechnology.com Vendor notified: 10/09/2012 Vendor response: This product has been replaced by 'ServiceDesk' but fixes may be available with valid support contracts. Credit: Joseph Sheridan of ReactionIS Affected Products Helpbox 4.4.0 Details It is possible to access other users' support tickets simply by changing the 'sys_request_id' parameter to an arbitrary value on the editrequestuser.asp page. Impact An attacker can login as any user he/she wishes and make arbitrary changes to the application data. Solution Layton advise upgrading to their newer 'ServiceDesk' product. However, if you have an active support contract, Layton may be able to provide fixes for you. About ReactionIS Reaction Information Security is a leading independent pen test consultancy specialising in delivering the highest quality security testing services including network pen testing and web application security testing. As a CESG CHECK Service Provider we are authorised to carry out penetration testing on classified government networks.

References:

http://www.laytontechnology.com


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top