exploit the possibilities

Temenos T24 R07.03 Authentication Bypass

Temenos T24 R07.03 Authentication Bypass
Posted Jul 31, 2012
Authored by Dionach

Temenos T24 R07.03 suffers from an authentication bypass vulnerability as it fails to properly enforce access control on the password reset functionality.

tags | exploit, bypass
MD5 | 8193c90bebc266d380bad904698efe10

Temenos T24 R07.03 Authentication Bypass

Change Mirror Download
TEMENOS T24 R07.03 authentication bypass

Class: Access Validation Error
Remote: Yes
Local: No
Published: 26/06/2012
Credit: Raymond Rizk of Dionach Limited (vulns@dionach.com)

Vulnerable: TEMENOS T24 R07.03

TEMENOS T24 is prone to an authentication bypass vulnerability as it fails to properly enforce access control on the password reset functionality.

An attacker may leverage this issue to reset any user’s password and login as that user. This would have an impact on the confidentiality, integrity and availability of data stored in the application. This would also have an impact on accountability.

TEMENOS T24 R07.03 is known to be vulnerable. Other versions may also be vulnerable.

An attacker can use a browser to exploit this vulnerability. This can be seen in the following example:

POST http://127.0.0.1/servlet/BrowserServlet
command=repeatpassword&requestType=UTILITY.ROUTINE&routineName=OS.PASSWORD&routineArgs=PROCESS.REPEAT%3AUSERNAME%3APASSWORD%3APASSWORD

Vendor is aware of this vulnerability.

Comments (1)

RSS Feed Subscribe to this comment feed
temenossecurity

This is already fixed in a later patch. If customers on T24 R07.03 are concerned, please contact the helpdesk or your account manager. All later version R08 - R12 are unaffected by this issue.

Comment by temenossecurity
2012-07-31 13:15:49 UTC | Permalink | Reply
Login or Register to post a comment

File Archive:

September 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    1 Files
  • 2
    Sep 2nd
    38 Files
  • 3
    Sep 3rd
    30 Files
  • 4
    Sep 4th
    15 Files
  • 5
    Sep 5th
    12 Files
  • 6
    Sep 6th
    17 Files
  • 7
    Sep 7th
    3 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    24 Files
  • 10
    Sep 10th
    22 Files
  • 11
    Sep 11th
    22 Files
  • 12
    Sep 12th
    15 Files
  • 13
    Sep 13th
    5 Files
  • 14
    Sep 14th
    2 Files
  • 15
    Sep 15th
    1 Files
  • 16
    Sep 16th
    11 Files
  • 17
    Sep 17th
    16 Files
  • 18
    Sep 18th
    7 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close