August 30, 2013 at 7:15 pm #8568AndyPParticipant
Advisory ID: HTB23169
Vendor: Open Dynamics
Vulnerable Versions: 1.0 and probably prior
Tested Version: 1.0
Vendor Notification: July 31, 2013
Vendor Fix: August 22, 2013
Public Disclosure: August 28, 2013
Vulnerability Type: Improper Access Control [CWE-284]
CVE Reference: CVE-2013-5027
Risk Level: High
CVSSv2 Base Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Solution Status: Fixed by Vendor
Discovered and Provided: High-Tech Bridge Security Research Lab
High-Tech Bridge SA Security Research Lab (penetration testing company) has discovered vulnerability in Collabtive, which can be exploited to gain complete control over the application.
1) Improper Access Control in Collabtive: CVE-2013-5027
The vulnerability exists due to improper access restrictions to the third installation step after successfully installing the application. A remote attacker can send a specially crafted HTTP POST request to the “/install.php” script and create a new user with administrative privileges. The installation script is not deleted after application installation and is publicly available by default.
The following exploitation example creates a user with login “newadmin” and password “newpass”:
Update to Collabtive 1.1
 High-Tech Bridge Advisory HTB23169 – https://www.htbridge.com/advisory/HTB23169 – Improper Access Control in Collabtive.
 Collabtive – http://collabtive.o-dyn.de/ – Collabtive is a cloud based groupware easy and efficient for your projects.
 Common Vulnerabilities and Exposures (CVE) – http://cve.mitre.org/ – international in scope and free for public use, CVE® is a dictionary of publicly known information security vulnerabilities and exposures.
 Common Weakness Enumeration (CWE) – http://cwe.mitre.org – targeted to developers and security practitioners, CWE is a formal list of software weakness types.
- You must be logged in to reply to this topic.