exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Kony EMM 1.2 Insecure Direct Object Reference

Kony EMM 1.2 Insecure Direct Object Reference
Posted Feb 23, 2015
Authored by Michael Hendrickx

Kony EMM version 1.2 suffers from an insecure direct object reference vulnerability.

tags | exploit
advisories | CVE-2014-8487
SHA-256 | 4ae88ded8493b490c6e43fa9c02849c47b3dc15fefa544ac71e8150dee3bae25

Kony EMM 1.2 Insecure Direct Object Reference

Change Mirror Download
------------------------------------------------------------------------
Product: Enterprise Mobile Management
Vendor: Kony
Vulnerable Version(s): Kony EMM 1.2 and probably older versions
Tested Version: Drupal Kony EMM 1.2
Advisory Publication: 24 December 2014
Vendor Notification: 8 December 2014
Vulnerability Type: Insecure Direct Object References
CVE Reference: CVE-2014-8487
Risk Level: Low Solution
Status: Solution not yet released
Discovered and Provided: Michael Hendrickx, Help AG
------------------------------------------------------------------------

About the vendor:
Kony EMM is a mobile management suite that allows organizations to manage employee's personal devices. It enables users to use their own device, or as often called BYOD or "bring your own device".

About the vulnerability:
During a pentest we discovered that a logged in user can access arbitrary information such as messages and phone information about every phone that's enrolled ot the solution. Often the user's colleagues:

1.) Arbitrary Message retrieval
By using the following URL:

https://<kony_emm>/emm/selfservice/managedevice/getMessageBody?messageId=<message ID>

Where <message ID> is an integer, an attacker can retrieve all messages sent to every mobile enrolled on the system.

2.) Information retrieval

By going to the following URL

https://<kony_emm>/emm/selfservice/devicemgmt/getDeviceInfoTab.htm?requestId=<request_id>&..."

An attacker can retrieve earlier "requests". A request "task" is generated when a person requests more information about his/her phone, such as IMEI numbers, phone, last locations, etc.

-----------------------

Solution:

The vendor was notified, contact the vendor for the patch details

References:

[1] help AG middle East http://www.helpag.com/
[2] Kony https://kony.com/
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close