exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Easy Enterprise DMS Cross Site Scripting / Unauthorized Access

Easy Enterprise DMS Cross Site Scripting / Unauthorized Access
Posted Mar 28, 2010
Authored by Michael Mueller

Easy Enterprise DMS suffers from cross site scripting, content injection, unauthorized file access and unauthorized manipulation of data vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | ffc5c8f644091d1f1953cb239720151c7c942d4d91d6630cc360fbfa5f7ea20c

Easy Enterprise DMS Cross Site Scripting / Unauthorized Access

Change Mirror Download
------------------------------------------------

Multiple Vulnerabilities in EASY Enterprise DMS
- Stored XSS
- XSS
- Content Injection / Phishing through Frames
- Unauthorized access to files
- Unauthorized manipulation of data
Date: 25.03.2010

------------------------------------------------

EASY Enterprise is a widespread and popular document management system.
Release version 6.0f (Nov 24 2009 #1752) has been found vulnerable to multiple attacks, which affect the integrity and confidentiality of stored content, as well as a compromise of multitenancy.

- XSS, CI / Phishing
File: epctrl.jsp
Parameter: login
Parameter: lng
Parameter: dsn

File: dlc_printLB.jsp
Parameter: dlcFileId


- Stored XSS
In file upload function, parameter filename. No further example will be provided.

- Unauthorized access to files
By changing a URL Parameter (dlcFolderId) to a proper value, it is possible to get access to files the user has no rigths on.

in Addition by guessing values for parameters dlcDocumentId and dlcFileId an unprivileged user is able to download any file stored in the application.

- Unauthorized manipulation of data
By simply enabling deactivated buttons in the server response, an unprivileged user is able to manipulate stored data (document owner, upload user, document state, approval flag)


- Solution
Contact the vendor for a patch or upgrade to version 1754 or higher.

- Credits

The vulnerabilities were discovered by Michael Mueller from Integralis
michael#dot#mueller#at#integralis#dot#com

- Timeline
04.01.2010 - Vulnerabilities discovered
04.01.2010 - Vendor contacted with details
05.01.2010 - Initial vendor response with ACK and fix solution
21.01.2010 - Additional vulnerabilities discovered
22.01.2010 - Vendor contacted with details
Up to date: No vendor response
25.03.2010 - Public release
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close