what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Collaboration Compliance And Quality Management Platform Disclosure

Collaboration Compliance And Quality Management Platform Disclosure
Posted Oct 3, 2018
Authored by Tobias Huppertz | Site syss.de

Collaboration Compliance and Quality Management Platform versions and below suffer from a password disclosure vulnerability.

tags | exploit
advisories | CVE-2018-17871
SHA-256 | 0018ec5778d402f160a3a47a794d2be0f3045f1ad2e4f4fdefd4292239008402

Collaboration Compliance And Quality Management Platform Disclosure

Change Mirror Download
Hash: SHA256

Advisory ID: SYSS-2018-023
Product: Collaboration Compliance and Quality Management Platform
Manufacturer: Verint Verba
Affected Version(s): <=
Tested Version(s):
Vulnerability Type: Improper Access Control (CWE-284)
Risk Level: Medium
Solution Status: Fixed
Manufacturer Notification: 2018-08-29
Solution Date: 2018-08-31
Public Disclosure: 2018-10-02
CVE Reference: CVE-2018-17871
Author of Advisory: Tobias Huppertz, SySS GmbH



Collaboration Compliance and Quality Management Platform is a product
to record and play calls with VoIP-telephons including Skype, messages
and video. The permission management works with different roles and
groups. So member can just play their own calls and investigators can
also play calls of other users.

The manufacturer describes the product as follows (see [1]):

"Verint Essential Workforce Optimization offers advanced automation to
get the most from your workforce. Our software and services can
enhance the efficiency of your employees and processes, and enable you
to share workforce intelligence in real-time across your
business. Mid-market contact centers, back-office operations, branch
operations and financial trading rooms can rely on Verint Essential
Workforce Optimization to capture and store interactions, heighten
quality, ensure compliance and help manage the availability and
performance of employees in targeted areas of their businesses."


Vulnerability Details:

At the page "Change Configuration Settings" the user can see the
configuration. Passwords are obfuscated by dot operator, but the
server delivers passwords in plaintext. By editing the html source
code in the browser the password fields can be modified to edit fields
and the passwords gets visible.


Proof of Concept (PoC):

A logged in user can see configured passwords in plaintext. Access the page
"Change Configuration Settings", start the Developer Tools (Internet Explorer
11: key F12). Modify the password type from type='password' to type='edit'
fields and the passwords are visible in plaintext. For example "Key File
Password" (server certificate) and "Database Password" (SQL Server).



Install the new version, which was published by the vendor [2].


Disclosure Timeline:

2018-08-16: Vulnerability discovered
2018-08-30: Vulnerability reported to manufacturer
2018-08-30: Vulnerability confirmed by manufacturer
2018-08-31: Update released by manufacturer
2018-10-01: CVE number assigned
2018-10-02: Public disclosure of vulnerability



[1] Collaboration Compliance and Quality Management Platform
[2] Verba 9.2 Release Notes (build - RI-016911
[3] SySS Security Advisory SYSS-2018-023
[4] SySS Responsible Disclosure Policy



This security vulnerability was found by Tobias Huppertz of SySS GmbH.



The information provided in this security advisory is provided "as is"
and without warranty of any kind. Details of this security advisory
may be updated in order to provide as accurate information as
possible. The latest version of this security advisory is available on
the SySS Web site.



Creative Commons - Attribution (by) - Version 3.0
URL: http://creativecommons.org/licenses/by/3.0/deed.en


Login or Register to add favorites

File Archive:

June 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    18 Files
  • 2
    Jun 2nd
    13 Files
  • 3
    Jun 3rd
    0 Files
  • 4
    Jun 4th
    0 Files
  • 5
    Jun 5th
    32 Files
  • 6
    Jun 6th
    39 Files
  • 7
    Jun 7th
    22 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    0 Files
  • 11
    Jun 11th
    0 Files
  • 12
    Jun 12th
    0 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2022 Packet Storm. All rights reserved.

Security Services
Hosting By