Interspire Email Marketer Authentication Bypass

2017.10.18
Credit: Hakan Kusne
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-287


CVSS Base Score: 10/10
Impact Subscore: 10/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Complete
Integrity impact: Complete
Availability impact: Complete

Title: ====== Interspire Email Marketer - Remote Admin Authentication Bypass Author: ======= Hakan KA1/4sne, Infoteam Security (CH) CVE-ID: ======= CVE-2017-14322 Risk Information: ================= CVSS Base Score: 9.8 CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O Timeline: ========= 2017-09-12 Vulnerability discovered 2017-09-12 Discovered vendor already fixed it but never communicated to clients, leaving hundreds vulnerable in the wild 2017-10-17 Public disclosure Affected Products: ================== Interspire Email Marketer prior to version 6.1.6 Vendor Homepage: ================ http://www.interspire.com/emailmarketer/ Details: ======== The function in charge of checking whether the user is already logged in init.php in Interspire Email Marketer (IEM) prior to 6.1.6 allows remote attackers to bypass authentication and obtain administrative access by using the IEM_CookieLogin cookie with a specially crafted value. On top of that, if the customer doesn't have an annuel maintenance plan, the application says that it's on the last available version and there is no update. The vulnerabilities were found during an incident response on a compromise instance of the application. Proof of Concept: ================= Details provided here : https://security.infoteam.ch/en/blog/posts/narrative-of-an-incident-response-from-compromise-to-the-publication-of-the-weakness.html Fix: ==== Vendor has patched the vulnerability in version 6.1.6, but never communicated to it's customers about it specifically.

References:

https://security.infoteam.ch/en/blog/posts/narrative-of-an-incident-response-from-compromise-to-the-publication-of-the-weakness.html


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top