what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Easy Enterprise DMS Cross Site Scripting / Unauthorized Access

Easy Enterprise DMS Cross Site Scripting / Unauthorized Access
Posted Mar 28, 2010
Authored by Michael Mueller

Easy Enterprise DMS suffers from cross site scripting, content injection, unauthorized file access and unauthorized manipulation of data vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | ffc5c8f644091d1f1953cb239720151c7c942d4d91d6630cc360fbfa5f7ea20c

Easy Enterprise DMS Cross Site Scripting / Unauthorized Access

Change Mirror Download
------------------------------------------------

Multiple Vulnerabilities in EASY Enterprise DMS
- Stored XSS
- XSS
- Content Injection / Phishing through Frames
- Unauthorized access to files
- Unauthorized manipulation of data
Date: 25.03.2010

------------------------------------------------

EASY Enterprise is a widespread and popular document management system.
Release version 6.0f (Nov 24 2009 #1752) has been found vulnerable to multiple attacks, which affect the integrity and confidentiality of stored content, as well as a compromise of multitenancy.

- XSS, CI / Phishing
File: epctrl.jsp
Parameter: login
Parameter: lng
Parameter: dsn

File: dlc_printLB.jsp
Parameter: dlcFileId


- Stored XSS
In file upload function, parameter filename. No further example will be provided.

- Unauthorized access to files
By changing a URL Parameter (dlcFolderId) to a proper value, it is possible to get access to files the user has no rigths on.

in Addition by guessing values for parameters dlcDocumentId and dlcFileId an unprivileged user is able to download any file stored in the application.

- Unauthorized manipulation of data
By simply enabling deactivated buttons in the server response, an unprivileged user is able to manipulate stored data (document owner, upload user, document state, approval flag)


- Solution
Contact the vendor for a patch or upgrade to version 1754 or higher.

- Credits

The vulnerabilities were discovered by Michael Mueller from Integralis
michael#dot#mueller#at#integralis#dot#com

- Timeline
04.01.2010 - Vulnerabilities discovered
04.01.2010 - Vendor contacted with details
05.01.2010 - Initial vendor response with ACK and fix solution
21.01.2010 - Additional vulnerabilities discovered
22.01.2010 - Vendor contacted with details
Up to date: No vendor response
25.03.2010 - Public release
Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    18 Files
  • 14
    Aug 14th
    50 Files
  • 15
    Aug 15th
    33 Files
  • 16
    Aug 16th
    23 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    43 Files
  • 20
    Aug 20th
    29 Files
  • 21
    Aug 21st
    42 Files
  • 22
    Aug 22nd
    26 Files
  • 23
    Aug 23rd
    25 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close