lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [day] [month] [year] [list]
Message-ID: <7f264efe-3382-8b4e-660f-a33ed36f17a9@atomicmail.io>
Date: Thu, 04 Dec 2025 16:27:53 +0000
From: Yuffie Kisaragi via Fulldisclosure <fulldisclosure@...lists.org>
To: "fulldisclosure@...lists.org" <fulldisclosure@...lists.org>
Cc: "security-vulnerability@....com" <security-vulnerability@....com>
Subject: [FD] Multiple Security Misconfigurations and Customer Enumeration
 Exposure in Convercent Whistleblowing Platform (EQS Group)

Advisory ID: CONVERCENT-2025-001
Title: Multiple Security Misconfigurations and Customer Enumeration Exposure in
Convercent Whistleblowing Platform (EQS Group)
Date: 2025-12-04
Vendor: EQS Group
Product: Convercent Whistleblowing Platform (app.convercent.com)
Severity: Critical
CVSS v4.0 Base Score: 9.3
Vector: AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N

Summary

A series of security weaknesses were identified in the Convercent whistleblowing
platform operated by EQS Group. These issues include missing critical HTTP
security headers, insecure and duplicated session cookies, inconsistent SameSite
attributes, incomplete clickjacking protection, and an unauthenticated API
endpoint that leaks internal customer legal entities. The vulnerabilities were
observed on multiple customer instances (e.g., Milliman, Röchling Group,
BorgWarner) demonstrating that the weaknesses affect multiple Convercent tenants
and appear systemic.


Because Convercent processes sensitive whistleblower reports, internal
misconduct disclosures, and protected-identity information, these
vulnerabilities pose a severe risk to confidentiality, integrity, and
operational privacy.


Findings

1. Missing Critical Security Headers

The platform does not send several essential browser security headers,
including:

- Content-Security-Policy
- Referrer-Policy
- Permissions-Policy
- Cross-Origin-Embedder-Policy
- Cross-Origin-Opener-Policy
- Cross-Origin-Resource-Policy

The lack of these protections leaves Convercent pages vulnerable to cross-site
scripting, clickjacking, browser API misuse, cross-origin data leakage, and
weakened process isolation.

2. Weak HSTS Configuration and Formatting Issues

The platform currently sends the following Strict-Transport-Security header:

- Strict-Transport-Security: max-age=86400;includeSubDomains

This configuration uses an unusually small max-age value (24 hours), causing
browsers to quickly discard the HTTPS-only policy and leaving users vulnerable
to downgrade and SSL-stripping attacks. The missing space after the semicolon
(;includeSubDomains) is not an RFC violation but may affect parsing reliability
in certain intermediaries or older clients, reducing consistency and enforcement
of security expectations.

A more robust and industry-aligned configuration would be:
- Strict-Transport-Security: max-age=31536000; includeSubDomains; preload

This longer duration, proper formatting, and optional preload directive provide
stronger, long-term HTTPS enforcement appropriate for a high-sensitivity
whistleblowing platform.

3. Duplicate Session Cookies
Multiple instances were found issuing two identical ASP.NET_SessionId cookies.

Duplicate session cookies may cause authentication instability, session override
conditions, and session fixation. This constitutes a protection mechanism
failure (CWE-693) and may indicate inconsistent load balancer or
application-layer handling.

4. Missing Secure Attribute on Affinity Cookie

One affinity cookie (ApplicationGatewayAffinity) lacked the Secure attribute,
exposing session metadata to potential interception on non-encrypted channels.
This is a serious misconfiguration for a system that handles sensitive
disclosures.

5. Inconsistent SameSite Attributes

Cookies within the platform defined mixed or absent SameSite values.

Such inconsistency may permit cross-site request leakage, session forwarding to
unintended origins, and unpredictable behavior in modern browsers. This
increases exposure to CSRF and related session compromise risks.

6. Incomplete Clickjacking Protection

The platform sets X-Frame-Options twice but does not define modern framing
restrictions using Content-Security-Policy’s frame-ancestors directive. As a
result, clickjacking protection is incomplete and can be bypassed.

7. Customer Enumeration via Unauthenticated API Endpoint

An unauthenticated API endpoint was found:

https://app.convercent.com/en-US/Anonymous/IssueIntake/GetLegalEntity?searchText=

This endpoint returns internal customer legal entities based on the supplied
search fragment.

By querying the endpoint with common legal-suffix search terms such as “plc”,
“ag”, “sa”, “nv”, “ab”, “publ”, “oyj”, “asa”, it is possible to identify
publicly traded companies using Convercent. Since these suffixes correspond to
stock-quoted entities across various jurisdictions, attackers can derive a
meaningful portion of Convercent’s publicly listed customers.


E.g.:
-
https://app.convercent.com/en-US/Anonymous/IssueIntake/GetLegalEntity?searchText=plc
-
https://app.convercent.com/en-US/Anonymous/IssueIntake/GetLegalEntity?searchText=ag
-
https://app.convercent.com/en-US/Anonymous/IssueIntake/GetLegalEntity?searchText=sa
-
https://app.convercent.com/en-US/Anonymous/IssueIntake/GetLegalEntity?searchText=nv
-
https://app.convercent.com/en-US/Anonymous/IssueIntake/GetLegalEntity?searchText=ab
-
https://app.convercent.com/en-US/Anonymous/IssueIntake/GetLegalEntity?searchText=publ
-
https://app.convercent.com/en-US/Anonymous/IssueIntake/GetLegalEntity?searchText=oyj
-
https://app.convercent.com/en-US/Anonymous/IssueIntake/GetLegalEntity?searchText=asa

Critical Implications of Customer Enumeration

- Identification of organizations using the platform, even when such information
is not publicly disclosed;
- Construction of target lists for phishing, insider-trading intelligence,
extortion attempts, or regulatory exploitation;
- Exposure of sensitive business relationships and internal compliance
structures;
- Automated harvesting of thousands of customer entities through scriptable,
unauthenticated queries;
- Violation of expected confidentiality surrounding whistleblower
infrastructure, which is often deliberately undisclosed.

Impact

Confidentiality: High
Sensitive metadata, session information, and customer identity details can be
disclosed.

Integrity: High
Session fixation, cookie manipulation, and framing attacks could enable
unauthorized actions.

Availability: No
The vulnerabilities do not directly impair availability.

Scope: Changed
The absence of COOP/COEP and the presence of cross-origin weaknesses enable
privilege extension beyond the originating tenant.

Given the nature of data processed by whistleblowing systems, these weaknesses
represent a critical failure of security design and operational hardening.


Mitigation

The Convercent platform should implement the following:


Enforce modern security headers:

- Content-Security-Policy
- Referrer-Policy
- Permissions-Policy
- COEP, COOP, CORP


Revices HTSTS configuration.

Ensure only one session cookie is issued and add Secure and consistent SameSite
attributes to all cookies.

Implement proper clickjacking protection using CSP frame-ancestors.

Remove or restrict the GetLegalEntity API endpoint or require authentication to
prevent customer enumeration.

Conduct a platform-wide review of cookie handling, tenant configuration, and
load balancer behavior.


Affected Examples

Publicly reachable Convercent instances exhibiting similar behavior include:

Milliman
https://app.convercent.com/en-US/LandingPage/c9d65965-b01f-ec11-a985-000d3ab9f062


Röchling Group
https://app.convercent.com/en-us/Anonymous/IssueIntake/LandingPage/06ab7f15-a3ab-ed11-a99a-000d3ab9f062


BorgWarner
https://app.convercent.com/en-us/Anonymous/IssueIntake/IdentifyOrganization


These examples illustrate that the vulnerabilities are not isolated to a single
tenant but reflect systemic issues across the Convercent platform.


Vendor Status

As of 2025-12-04, no mitigation has been observed. The vendor has not responded
to this disclosure.


Timeline:

2025-09-12 - Vulnerability discovered
2025-09-12 - Vendor contacted at security-vulnerability@....com using
responsible disclosure as for https://www.eqs.com/report-a-vulnerability/ (no
response)
2025-11-13 - Second vendor contact (no response)
2025-12-04 - Public disclosure


References

- OWASP Top 10 – A05:2021 Security Misconfiguration
- CWE-693: Protection Mechanism Failure
- NIST SP 800-53 Rev. 5 – SC-34, SC-18
- ISO/IEC 27001:2022 – 8.25 and 8.28


Disclaimer

All research supporting this advisory relied only on publicly available
endpoints and did not involve probing, exploitation, or any action that could
impact system integrity or user privacy. The intent of this publication is to
promote safer and more resilient security environments.
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: https://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ