exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

hummingbirdVulns.txt

hummingbirdVulns.txt
Posted Jan 11, 2006
Authored by Luca Carettoni, Federico Maggi | Site securenetwork.it

Hummingbird Collaboration versions 5.2.1 and below suffer from cross site scripting, improper file handling, and information disclosure vulnerabilities.

tags | advisory, vulnerability, xss, info disclosure
SHA-256 | f3a90a238b8ae699d77c308f0f0bf299c07360001f625c4774af61491c1676e7

hummingbirdVulns.txt

Change Mirror Download
Secure Network - Security Research Advisory

Vuln name: Multiple Vulnerabilities in Hummingbird Collaboration
Systems affected: Collaboration 5.2.1 and lower versions
Severity: Low
Local/Remote: Remote
Vendor URL: http://www.hummingbird.com/products/enterprise/collaboration/
Author(s): Luca Carettoni - luca.carettoni@securenetwork.it
Federico Maggi - federico.maggi@securenetwork.it
Vendor disclosure: 20th December 2005
Vendor acknowledged: 21st December 2005
Public disclosure: 10th January 2006
Advisory number: SN-2006-01
Advisory URL: http://www.securenetwork.it/advisories/

*** SUMMARY ***

Hummingbird Collaboration is a Web-based collaborative groupware for
teams across and beyond the enterprise.
It integrates different works on single projects accessed by several
concurrent users, improving efficiency, organization and automated workflow.

Regular and registered users can easily access to all project information,
documents, discussion threads, tasks list through the Web.

It includes several utilities like messaging system, project and
file manager and a Web calendar.

(a) Cross-Site Scripting (XSS), (b) improper file handling and (c) information disclosure
vulnerabilities are present and can be exploited remotely.

*** VULNERABILITY DETAILS ***

(a) Cross Site Scripting (XSS)

A second-order XSS have been found. It allows permanent scripting by uploading
malicious client side scripts by embedding them in a HTML page.
Hummingbird Collaboration does not verify the content of HTML files during the
uploading process.
In addition, the collaborative groupware does not force the HTML to be downloaded
(e.g. forcing the "Content-Disposition" property): As a result, the HTML page
and embedded scripts are normally interpreted and rendered by the user browser.
An attacker could (1) plan session hijacking attacks, (2) prepare phishing
(a regular user could be tricked by presenting him/her with a fake login page)
and (3) affect the usability and the availability of the service.

(b) Improper file handling

Using a crafted URL, a user could force the download of a previously uploaded
file changing its original name.
By exploiting this vulnerability, a regular user can be tricked about
file content and filename of what he/she's downloading.

(c) Information disclosure

By inspecting some application responses it is possible to get more information
about the parameters type and format. Instead of displaying generic error
messages, detailed information are sent to the client (e.g. the parameter must be TRUE or FALSE).
Moreover, by inspecting the application cookies is it possible to get internal
network information about the IP address of the application server.

*** EXPLOIT ***

(a) An attacker can simply upload an HTML file with embedded malicious
scripts (e.g. Javascript) using the file manager utility.

(b) An attacker would need to trick the user into downloading a certain
file with a crafted URL, like the following one:
https://mySite/hc/hc/fake.doc?d=fc&o=dwnd&fid=1189762&did=89777&x=16080&doc_ext=.txt
In this example, the file with id equal to 1189762 is downloaded,
changing the name and the type of txt file in "fake.doc".

Other techniques (e.g. XSS) make it easy to create a fake link
similar to the previous one.

(c) In most cases it just involves the inspection of server responses.
The following URL shows an example of improper error handling
https://mySite/hc/hc?d=mes&x=20433&ntb=[numericParam]
using [numericParam] instead of a string parameter.
The internal IP address is "encoded" into the cookie name
(e.g. com.peopledoc.rhum.JURA_SESSION_ID_192.168.1.1_0.71221182=972323;).

*** FIX INFORMATION ***

The vendor suggests that updating the software solves this
vulnerability, however we have not been able to test the latest
versions and to confirm this.

Future versions will also integrate a scan engine to detect malicious Javascript.

*** WORKAROUNDS ***

It should be noted that the server may only be accessed by users
who have accounts and who have been correctly authenticated.
Users may be restricted to be read-only so that they cannot upload files.

*********************
*** LEGAL NOTICES ***
*********************

Secure Network (www.securenetwork.it) is an information security company,
which provides consulting and training services, and engages in security
research and development.

We are committed to open, full disclosure of vulnerabilities, cooperating
with software developers for properly handling disclosure issues.

This advisory is copyright © 2006 Secure Network S.r.l. Permission is
hereby granted for the redistribution of this alert, provided that it is
not altered except by reformatting it, and that due credit is given. It
may not be edited in any way without the express consent of Secure Network
S.r.l. Permission is explicitly given for insertion in vulnerability
databases and similars, provided that due credit is given to Secure Network

The information in the advisory is believed to be accurate at the time of
publishing based on currently available information. This information is
provided as-is, as a free service to the community by Secure Network
research staff. There are no warranties with regard to this information.
Secure Network does not accept any liability for any direct, indirect,
or consequential loss or damage arising from use of, or reliance on,
this information.

If you have any comments or inquiries, or any issue with what is reported
in this advisory, please inform us as soon as possible.

E-mail: securenetwork@securenetwork.it
GPG/PGP key: http://www.securenetwork.it/pgpkeys/Secure%20Network.asc
Phone: +39 0363 560 402
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close