exploit the possibilities

Group-Office Cleartext Credentials Stored In Cookies

Group-Office Cleartext Credentials Stored In Cookies
Posted Aug 14, 2012
Authored by Joseph Sheridan, Chris Cooper | Site reactionpenetrationtesting.co.uk

Group-Office version 4.0.71 stores credentials in the clear in cookies.

tags | advisory, info disclosure
advisories | CVE-2012-4239
MD5 | b6ef4e6a04a55a8b1b1ad5114d7a61c2

Group-Office Cleartext Credentials Stored In Cookies

Change Mirror Download
| Group-Office Cleartext Credentials Stored in Cookies |


Group-Office 4.0.71 was found to display a behaviour that could potentially
expose a user's username and cleartext password to third-parties. Under
certain circumstances the application would return two cookies, one
containing the user's username and the other their cleartext password. These
cookies would then be returned to the server with each request to the

CVE number: CVE-2012-4239
Impact: Medium
Vendor homepage: http://www.group-office.com/
Vendor notified: 19/07/2012
Vendor fixed: 25/07/2012
Credit: Chris Cooper and Joseph Sheridan of Reaction Information Security

This advisory is posted at:


Affected Products
======== ========

Confirmed in Group-Office community 4.0.71. Other versions may also be


When logging into the application, if a user ticks the 'Remember my login on
this computer until I press logout' box, and then successfully logs into the
application, two cookies ('GO_UN' and 'GO_PW') are returned. These cookies
contain the user's username and cleartext password respectively.

The cookies are set with the 'HttpOnly' flag which would significantly
reduce the chances of their disclosure during a cross-site scripting attack.
However, the application does not enforce a secure channel by default, and
the offending cookies are not set with the 'Secure' flag.


Once these cookies are stored, the user's username and password could be
transferred over an insecure HTTP connection, increasing the liklihood that
an attacker might be able to intercept the credentials and access the

Furthermore, the cleartext credentials will be stored on the computer which
makes them more easily accessible to an attacker with access to the machine.
This significantly lowers the difficulty of exploitation.


Upgrade to Group-Office community 4.0.73.


In addition to posting on the website, a text version of this notice has
been posted to the following e-mail and Usenet news recipients.

* bugtraq () securityfocus com
* full-disclosure () lists grok org uk

Future updates of this advisory, if any, will be placed on the ReactionIS
corporate website, but may or may not be actively announced on mailing lists
or newsgroups. Users concerned about this problem are encouraged to check
the URL below for any updates:



Reaction Information Security
Lombard House Business Centre,
Suite 117,
12-17 Upper Bridge Street,
Canterbury, Kent, CT1 2NF

Phone: +44 (0)1227 785050
Email: research () reactionis {dot} co {dot} uk
Web: http://www.reactionpenetrationtesting.co.uk


RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

May 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    16 Files
  • 2
    May 2nd
    8 Files
  • 3
    May 3rd
    8 Files
  • 4
    May 4th
    2 Files
  • 5
    May 5th
    1 Files
  • 6
    May 6th
    15 Files
  • 7
    May 7th
    22 Files
  • 8
    May 8th
    16 Files
  • 9
    May 9th
    17 Files
  • 10
    May 10th
    16 Files
  • 11
    May 11th
    3 Files
  • 12
    May 12th
    4 Files
  • 13
    May 13th
    25 Files
  • 14
    May 14th
    24 Files
  • 15
    May 15th
    78 Files
  • 16
    May 16th
    16 Files
  • 17
    May 17th
    16 Files
  • 18
    May 18th
    2 Files
  • 19
    May 19th
    1 Files
  • 20
    May 20th
    11 Files
  • 21
    May 21st
    21 Files
  • 22
    May 22nd
    20 Files
  • 23
    May 23rd
    36 Files
  • 24
    May 24th
    2 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2019 Packet Storm. All rights reserved.

Security Services
Hosting By