exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

CA 2E Web Option 8.1.2 Privilege Escalation / Denial Of Service

CA 2E Web Option 8.1.2 Privilege Escalation / Denial Of Service
Posted Feb 13, 2014
Authored by Mike Emery | Site portcullis-security.com

CA 2E Web Option version 8.1.2 suffers from an unauthenticated privilege escalation vulnerability that can allow for a denial of service condition.

tags | exploit, web, denial of service
advisories | CVE-2014-1219
SHA-256 | cb6ba2704a2a0e3d944bde61fec01be38663ee9a4892d786234c64e6316d2156

CA 2E Web Option 8.1.2 Privilege Escalation / Denial Of Service

Change Mirror Download
This is a multi-part message in MIME format.

------_=_NextPart_001_01CF280B.6C29886A
Content-Type: text/plain;
charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Vulnerability title: Unauthenticated Privilege Escalation in CA 2E Web
Option

CVE: CVE-2014-1219
Vendor: CA
Product: 2E Web Option
Affected version: 8.1.2
Fixed version: N/A
Reported by: Mike Emery

Details:

=20 CA 2E Web Option (r8.1.2) and potentially others, is vulnerable=

to unauthenticated privilege escalation via a predictable session token.
The POST parameter session token W2E_SSNID appears as follows:

W2E_SSNID=3DW90NIxGoSsN1023ZYW2E735182000013CLSpKfgkCJSLKsc600061JKenjKnE=
D
JuNX9GoVjCEbqIuKh6kFRvbzYnUxgQtONszJldyAar3LtTSwsmBLpdlPc5iDH4Zf75


=20 However, this token is poorly validated, leading to

W2E_SSNID=3DW90NIxGoSsN1023ZYW2E735182000013

=20 being accepted as a valid session. By incrementing and
decrementing the digits at the end of the value given above, it is
possible to control the session at the given ID. This token is sent as
part of the login page, and as such, can be manipulated by an
unauthenticated attacker, giving them access to any valid session.
Consequentially, it is possible to access the following page as such:

https://app.domain.co.uk/web2edoc/close.htm?SSNID=3DW90NIxGoSsN1023ZYW2E7=
3
5182000026

=20 Ending the session specified, which could lead to a denial of
service condition.


=20 =20
Further details at:=20
http://portcullis-security.com/security-research-and-downloads/security-
advisories/cve-2014-1219/


Copyright:
Copyright (c) Portcullis Computer Security Limited 2014, All rights
reserved worldwide. Permission is hereby granted for the electronic
redistribution of this information. It is not to be edited or altered in
any way without the express written consent of Portcullis Computer
Security Limited.

Disclaimer:
The information herein contained may change without notice. Use of this
information constitutes acceptance for use in an AS IS condition. There
are NO warranties, implied or otherwise, with regard to this information
or its use. Any use of this information is at the user's risk. In no
event shall the author/distributor (Portcullis Computer Security
Limited) be held liable for any damages whatsoever arising out of or in
connection with the use or spread of this information.


###############################################################
This email originates from the systems of Portcullis
Computer Security Limited, a Private limited company,=20
registered in England in accordance with the Companies=20
Act under number 02763799. The registered office=20
address of Portcullis Computer Security Limited is:=20
The Grange Barn, Pikes End, Pinner, MIDDX,=20
United Kingdom, HA5 2EX.=20
The information in this email is confidential and may be=20
legally privileged. It is intended solely for the addressee.=20
Any opinions expressed are those of the individual and=20
do not represent the opinion of the organisation. Access=20
to this email by persons other than the intended recipient=20
is strictly prohibited.
If you are not the intended recipient, any disclosure,=20
copying, distribution or other action taken or omitted to be=20
taken in reliance on it, is prohibited and may be unlawful.=20
When addressed to our clients any opinions or advice=20
contained in this email is subject to the terms and=20
conditions expressed in the applicable Portcullis Computer=20
Security Limited terms of business.
###############################################################

#########################################################################=
############
This e-mail message has been scanned for Viruses and Content and cleared =

by MailMarshal.
#########################################################################=
############

------_=_NextPart_001_01CF280B.6C29886A
Content-Type: text/html;
charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD><TITLE></TITLE>
<META content=3D"text/html; charset=3Dus-ascii" http-equiv=3DContent-Type=
>
<META name=3DGENERATOR content=3D"MSHTML 9.00.8112.16526"></HEAD>
<BODY><!-- Converted from text/plain format -->
<P><FONT size=3D2>Vulnerability title: Unauthenticated Privilege Escalati=
on in CA=20
2E Web Option<BR><BR>CVE: CVE-2014-1219<BR>Vendor: CA<BR>Product: 2E Web =

Option<BR>Affected version: 8.1.2<BR>Fixed version: N/A<BR>Reported by: M=
ike=20
Emery<BR><BR>Details:<BR><BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; C=
A 2E=20
Web Option (r8.1.2) and potentially others, is vulnerable to unauthentica=
ted=20
privilege escalation via a predictable session token. The POST parameter =
session=20
token W2E_SSNID appears as=20
follows:<BR><BR>W2E_SSNID=3DW90NIxGoSsN1023ZYW2E735182000013CLSpKfgkCJSLK=
sc600061JKenjKnEDJuNX9GoVjCEbqIuKh6kFRvbzYnUxgQtONszJldyAar3LtTSwsmBLpdlP=
c5iDH4Zf75<BR><BR><BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=20
However, this token is poorly validated, leading=20
to<BR><BR>W2E_SSNID=3DW90NIxGoSsN1023ZYW2E735182000013<BR><BR>&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=20
being accepted as a valid session. By incrementing and decrementing the d=
igits=20
at the end of the value given above, it is possible to control the sessio=
n at=20
the given ID. This token is sent as part of the login page, and as such, =
can be=20
manipulated by an unauthenticated attacker, giving them access to any val=
id=20
session. Consequentially, it is possible to access the following page as =

such:<BR><BR><A=20
href=3D"https://app.domain.co.uk/web2edoc/close.htm?SSNID=3DW90NIxGoSsN10=
23ZYW2E735182000026">https://app.domain.co.uk/web2edoc/close.htm?SSNID=3D=
W90NIxGoSsN1023ZYW2E735182000026</A><BR><BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;=20
Ending the session specified, which could lead to a denial of service=20
condition.</FONT></P>
<P><FONT=20
size=3D2><BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<BR>Further=20
details at: <BR></FONT><FONT size=3D2><A=20
href=3D"http://portcullis-security.com/security-research-and-downloads/se=
curity-advisories/cve-2014-1219/">http://portcullis-security.com/security=
-research-and-downloads/security-advisories/cve-2014-1219/</A><BR><BR><BR=
>Copyright:<BR>Copyright=20
(c) Portcullis Computer Security Limited 2014, All rights reserved worldw=
ide.=20
Permission is hereby granted for the electronic redistribution of this=20
information. It is not to be edited or altered in any way without the exp=
ress=20
written consent of Portcullis Computer Security=20
Limited.<BR><BR>Disclaimer:<BR>The information herein contained may chang=
e=20
without notice. Use of this information constitutes acceptance for use in=
=20an AS=20
IS condition. There are NO warranties, implied or otherwise, with regard =
to this=20
information or its use. Any use of this information is at the user's risk=
. In no=20
event shall the author/distributor (Portcullis Computer Security Limited)=
=20be=20
held liable for any damages whatsoever arising out of or in connection wi=
th the=20
use or spread of this information.</FONT></P>
<P>
<HR>
</P>
<P>This email originates from the systems of Portcullis<BR>Computer Secur=
ity=20
Limited, a Private limited company, <BR>registered in England in accordan=
ce with=20
the Companies <BR>Act under number 02763799. The registered office <BR>ad=
dress=20
of Portcullis Computer Security Limited is: <BR>The Grange Barn, Pikes En=
d,=20
Pinner, MIDDX, <BR>United Kingdom, HA5 2EX. <BR>The information in this e=
mail is=20
confidential and may be <BR>legally privileged. It is intended solely for=
=20the=20
addressee. <BR>Any opinions expressed are those of the individual and <BR=
>do not=20
represent the opinion of the organisation. Access <BR>to this email by pe=
rsons=20
other than the intended recipient <BR>is strictly prohibited.<BR>If you a=
re not=20
the intended recipient, any disclosure, <BR>copying, distribution or othe=
r=20
action taken or omitted to be <BR>taken in reliance on it, is prohibited =
and may=20
be unlawful. <BR>When addressed to our clients any opinions or advice=20
<BR>contained in this email is subject to the terms and <BR>conditions ex=
pressed=20
in the applicable Portcullis Computer <BR>Security Limited terms of=20
business.</P>
<P>
<HR>

<P></P>
<P></P>

<HR>
This e-mail message has been scanned for Viruses and Content and cleared =

by&nbsp;<FONT color=3D#400080><STRONG>MailMarshal</STRONG></FONT>=20
<HR>
</BODY></HTML>

------_=_NextPart_001_01CF280B.6C29886A--

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close