exploit the possibilities

LedgerSMB 1.3 Denial Of Service

LedgerSMB 1.3 Denial Of Service
Posted Jul 31, 2012
Authored by Chris Travers

A security oversight has been discovered in LedgerSMB 1.3 which could allow a malicious user to cause a denial of service against LedgerSMB or otherwise affect the way in which certain forms of data would get entered.

tags | advisory, denial of service
MD5 | cb66e6f2346d3301da55e95082a1e4d3

LedgerSMB 1.3 Denial Of Service

Change Mirror Download
A security oversight has been discovered in LedgerSMB 1.3 which could
allow a malicious user to cause a denial of service against LedgerSMB
or otherwise affect the way in which certain forms of data would get
entered. In most cases we do not believe this to be particularly
severe in the absence of poor internal process controls. Users in
some jurisdictions however may need to take this more seriously (see
full details below).

Basic details:

Login required: Yes
Complexity of Attack: Low
Impact: Can alter software settings in excess of authorization
Most likely impacts: Malicious employee could cause denial of service
for some features and regulatory compliance problems in some
jurisdictions.
Impact Level: Low for most users, moderate for others.

Who is not affected: Single user environments

Recommended Mitigating Measures: Proper internal process controls
greatly mitigate the impact of this issue.

Patch Availability: A patch is available from the LedgerSMB team but
it has not been fully regression tested. It can be obtained by
emailing chris@metatrontech.com and is scheduled for inclusion in
1.3.21.

Scope of Patch: This patch fixes the issue on the middleware level.
It has no impact on third party applications writing to the database
directly. It does not fix the problem on 1.2.x, and existing
workarounds are insufficient to address the issue in 1.2.x. If you
are using 1.2.x your best option is to upgrade to 1.3.x.

Full Details:

LedgerSMB stores many system settings in the database and many of
these must be incremented by ordinary users, so permissions are widely
granted to these setting tables. A malicious user could craft a
carefully formed URL and cause LedgerSMB to overwrite existing
settings. A few settings, however, are security-critical. Because
some invoice numbers, etc. are guaranteed to be unique, this could
interfere with posting of transactions in an automated environment,
and it could be used to ensure that password resets would lock users
out of the system. There were insufficient permissions checks on the
routines which update system settings and so consequently, could
overwrite existing values. These settings range in function from
email addresses where invoices are sent from, to the next invoice
number, to password duration. A malicious individual can thus change
security-related aspects of configuration, and change the value for
the next invoice to be generated. This cannot be used to grant
additional permissions to the user however.

Additionally in some locations invoices are required to be numbered in
a gapless way. Some countries require this in order to help cut down
on tax evasion. Because next invoice number settings can be
overwritten, this problem can run users into regulatory compliance
problems. Users in areas which require gapless numbering of financial
documents need to treat this problem as more severe.

Discovery:

Chris Travers found the problem during work on forthcoming versions.

Best Wishes,
Chris Travers

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

June 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    1 Files
  • 2
    Jun 2nd
    2 Files
  • 3
    Jun 3rd
    19 Files
  • 4
    Jun 4th
    21 Files
  • 5
    Jun 5th
    15 Files
  • 6
    Jun 6th
    12 Files
  • 7
    Jun 7th
    11 Files
  • 8
    Jun 8th
    1 Files
  • 9
    Jun 9th
    1 Files
  • 10
    Jun 10th
    15 Files
  • 11
    Jun 11th
    15 Files
  • 12
    Jun 12th
    15 Files
  • 13
    Jun 13th
    8 Files
  • 14
    Jun 14th
    16 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close