Document Title: =============== HTTP Commander AJS v3.1.9 - Client Side Exception Vulnerability References (Source): ==================== http://www.vulnerability-lab.com/get_content.php?id=1329 Release Date: ============= 2014-10-02 Vulnerability Laboratory ID (VL-ID): ==================================== 1329 Common Vulnerability Scoring System: ==================================== 2.5 Product & Service Introduction: =============================== The web file explorer HTTP Commander is designed for giving remote access to the Web server’s files. Using only the browser end-users can manage files and folders that are shared to them. There are some rich opportunities for online file editing, cloud services integration and storages. HTTP Commander is being installed on the Windows Server platform. The end-user can use Desktop PC, smartphone, pad with any OS and web browser. The application is the best alternative to FTP, WebDav, Sharepoint because it combines all their pluses and adds a lot of new opportunities. Every day more than 100 000 users from different companies and learning institutions use HTTP Commander. ( Copy of the Vendor Homepage: http://www.element-it.com/products.aspx ) Abstract Advisory Information: ============================== The Vulnerability Laboratory Research Team discovered a client-side vulnerability in the official HTTP Commander AJS v3.1.9 web-application. Vulnerability Disclosure Timeline: ================================== 2014-10-02: Public Disclosure (Vulnerability Laboratory) Discovery Status: ================= Published Affected Product(s): ==================== Element-IT Software Product: HTTP Commander - Web Application 3.1.8 Exploitation Technique: ======================= Remote Severity Level: =============== Medium Technical Details & Description: ================================ A non-persistent input validation web vulnerability has been discovered in the official HTTP Commander 3.1.9 web-application. The vulnerability allows remote attackers to inject own script codes to a client-side request to compromise application sessions. The client-side vulnerability is located in the `new folder add` input values and the connected exception-handling (The file/folder name isn`t set or contains incorrect characters).The application parses for example tags like