exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Web Encryption Extension Authentication Bypass

Web Encryption Extension Authentication Bypass
Posted Jul 28, 2014
Authored by Ralf Senderek

Web Encryption Extension (WEE) suffers from an authentication bypass vulnerability.

tags | advisory, web, bypass
SHA-256 | d5595fa91a8fa0538252e28f43e88473d0efbfa67e816fb5451770506195f0b3

Web Encryption Extension Authentication Bypass

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Revision: 1.0
Last Updated: 25 July 2014
First Published: 25 July 2014

Summary:
A security issue was found in the Web Encryption Extension.

Authenticated users are able to modify the content of https request
fields to insert code into the pipeline mechanism of PHP.


Severity: High


Affected Software Versions:

All versions of the Web Encryption Extension prior to version 3.0


Impact:

Authenticated users of the Web Encryption Extension are able to
inject code into user provided input, that will be executed with
web server permissions.

Fixes:

The vulnerability has been fixed in WEE version 3.0, upgrades to
this version must replace all active instances of WEE.

The following downloads are available:

https://senderek.ie/downlaods/latest/wee-3.0.tar
https://senderek.ie/downloads/release/webmail/wee-roundcube.tar
https://senderek.ie/downloads/release/cloud/wee-owncloud.tar
https://senderek.ie/downloads/release/db/wee-phpmyadmin.tar
https://senderek.ie/downloads/release/contact/securecontact.tar
https://senderek.ie/downloads/release/webmail/wee-atmailopen.tar
https://senderek.ie/downloads/release/webmail/wee-vtiger.tar



Risk Mitigation:

While using vulnerable versions of WEE, users are advised to disable
non-authenticated access like guest and demo accounts to the software.

(c) 2014 Senderek Web Security

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iQIcBAEBAgAGBQJT0qBIAAoJECyxzx4lRhdKttgQAJN4rhgyjCuh1TQuENpRaAtB
nHLNABaXvn6jvCmPX9Rqqk7JxS29mLfg5pbSZ6sxAEPudRDoecleVeKDgXfU+CLb
Uf6RCR9dj17OVy7CmZ05BKXX/Fv3VLk8H2OaIZz2P+vTp8ww4wWAWT3YnI6cuXg5
RLmyHTMk+sMN7eOXNq0uKkM+YArrryaAiVAb71s28z4VSAf5v0KtxBKIu8JlHV3w
hd7/SAIfxT8RTZVCLDh9uUpBpPNYgYEV0vd4OhzDVExT0w/aK1YT295+jZ8dmmnX
n+8wc7wkiQqQ8LGedEAdZdrgTAwLRfwTwh1mfRvmQ4pnYcwcjiBHT33S/L/WBa72
EMYBhkfcH6STLR0IVbklPZxHpbRlItbUvHG6ZCZ9+Pnh8baTtkuetXKb12zHW17l
nBpd+ecQZKZ8/XKf1uZGD+8C7EX0GEscV9V1yygz2OawMSx6Rmg7EmPZV1NprF05
prQ4uMSDIeF/2Ufy99fas7Wgl0qa0IZXQkOGM3MaDI+CXMR6P7fIo8WxZJ6NQk1S
/BHy8G4eKPed3pL3g1UhHZeuVA9NIuU3jGPvIJk2H0T2rtjmwUKLQLpAxkm+Zd4O
cziXn1ej8CdMKDDBKyMBSLjz44f3Ctj1eBWEN+sjE7Oky2EPRuYSs2ASh/Xsea5w
OauMHb9f1XN+hvUwOJmX
=wGyi
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close