HTB23169: Improper Access Control in Collabtive

Viewing 0 reply threads
  • Author
    • #8568

      Advisory ID: HTB23169
      Product: Collabtive
      Vendor: Open Dynamics
      Vulnerable Versions: 1.0 and probably prior
      Tested Version: 1.0
      Vendor Notification: July 31, 2013
      Vendor Fix: August 22, 2013
      Public Disclosure: August 28, 2013
      Vulnerability Type: Improper Access Control [CWE-284]
      CVE Reference: CVE-2013-5027
      Risk Level: High
      CVSSv2 Base Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
      Solution Status: Fixed by Vendor
      Discovered and Provided: High-Tech Bridge Security Research Lab

      Advisory Details:
      High-Tech Bridge SA Security Research Lab (penetration testing company) has discovered vulnerability in Collabtive, which can be exploited to gain complete control over the application.

      1) Improper Access Control in Collabtive: CVE-2013-5027
      The vulnerability exists due to improper access restrictions to the third installation step after successfully installing the application. A remote attacker can send a specially crafted HTTP POST request to the “/install.php” script and create a new user with administrative privileges. The installation script is not deleted after application installation and is publicly available by default.
      The following exploitation example creates a user with login “newadmin” and password “newpass”:

      Update to Collabtive 1.1

      More Information:

      [1] High-Tech Bridge Advisory HTB23169 – – Improper Access Control in Collabtive.
      [2] Collabtive – – Collabtive is a cloud based groupware easy and efficient for your projects.
      [3] Common Vulnerabilities and Exposures (CVE) – – international in scope and free for public use, CVE® is a dictionary of publicly known information security vulnerabilities and exposures.
      [4] Common Weakness Enumeration (CWE) – – targeted to developers and security practitioners, CWE is a formal list of software weakness types.

Viewing 0 reply threads
  • You must be logged in to reply to this topic.

Copyright ©2022 Caendra, Inc.

Contact Us

Thoughts, suggestions, issues? Send us an email, and we'll get back to you.


Sign in with Caendra

Forgot password?Sign up

Forgot your details?