TimeDoctor Pro 1.4.72.3 Insecure Transport

2015.07.01
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-345


CVSS Base Score: 9.3/10
Impact Subscore: 10/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: Complete
Integrity impact: Complete
Availability impact: Complete

TimeDoctor claims to be a software that helps to improve the productivity of teams, reduce time spent on distractions [1] Vulnerability: TimeDoctor autoupdate feature downloads and executes files over plain HTTP and doesn't perform any check with the files. An attacker with MITM capabilities (i.e., when user connects to a public wifi) could override the Timedoctor subdomain and then execute custom binaries on the machine where the application is running. The update mechanisms first downloads update.xml [2] which has the version number, url and a filename for the new installer. Credit: Fernando Mu?oz CVE: CVE-2015-4674 Version tested: TimeDoctor Pro 1.4.72.3 for Windows Other editions/versions maybe affected. Demo video: https://www.youtube.com/watch?v=t1JM4DaR130 Vendor acknowledged the issue on Jun 18 and a new version should be available today (Jun 29). [1] https://www.timedoctor.com/about-us.html [2] http://updates.timedoctor.com/download/_production/tdpro/windows/update.xml

References:

http://updates.timedoctor.com/download/_production/tdpro/windows/update.xml


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top