lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <1317019365.67107.YahooMailNeo@web95208.mail.in2.yahoo.com>
Date: Mon, 26 Sep 2011 12:12:45 +0530 (IST)
From: Sohil Garg <sohil_garg@...oo.co.in>
To: "full-disclosure@...ts.grok.org.uk" <full-disclosure@...ts.grok.org.uk>,
	secruityreason <secalert@...urityreason.com>, secunia <vuln@...unia.com>,
	"security.nnov" <vuln@...urity.nnov.ru>,
	securityteam <news@...uriteam.com>, 
	securitytracker <bugs@...uritytracker.com>,
	packetstorm <submissions@...ketstormsecurity.org>,
	bugtraq <bugtraq@...urityfocus.com>
Subject: [CVE-2011-3645] Multiple vulnerability in
	"Omnidocs"



 
Hi All,



I would like to inform about multiple vulnerability in NewGen's Omnidocs application. 


 Exploit Title: Multiple Vulnerability in "Omnidocs"
 Author: Sohil Garg

 CVE : CVE-2011-3645
 

Product Description:
OmniDocs is an Enterprise Document Management (EDM) platform for creating, capturing, managing, delivering and archiving large volumes of documents and 
contents. Also integrates seamlessly with other enterprise applications.

 
Vulnerability Details:

 

1.Vulnerbility Type
Privilege escalation

Affected URL: 
http://serverIP/omnidocs/doccab/doclist.jsp?DocListFolderId=927964&FolderType=G&FolderRights=010000000&FolderName=1234&FolderOwner=test&FolderLocation=G&Fold
erAccessType=I&ParentFolderIndex=100&FolderPathFlag=Y&Fetch=5&VolIndex=1&VolIndex=1
 
Vulnerable Parameter: 
FolderRights

Exploit
Omnidocs application does not validate 'FolderRights' parameter. This parameter could be modified to '111111111' to get full access including rights to add 
documents, add folders, delete folders and place orders.



2.Vulnerability Type
Direct Object Access

Sample URL:
http://serverIP/omnidocs/doccab/userprofile/editprofile.jsp

Vulnerable Parameter:
UserIndex

Exploit:
Omnidocs application does not validate 'UserIndex' parameter. 'UserIndex' parameter is used to access the personal setting page. This parameter can be 
changed to other valid numbers thereby gaining access to view or change other user's personal settings.


Timeline:
Notified Vendor: 01-Sep-2011
No response received from vendor for 3 weeks
Public Disclosure: 23-Sep-2011


Greetz to:

1] Nikhil Mittal
 
Thanks and Regards,
Sohil Garg
Content of type "text/html" skipped

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ