Post Fri Aug 30, 2013 2:15 pm

HTB23169: Improper Access Control in Collabtive

Advisory ID: HTB23169
Product: Collabtive
Vendor: Open Dynamics
Vulnerable Versions: 1.0 and probably prior
Tested Version: 1.0
Vendor Notification: July 31, 2013
Vendor Fix: August 22, 2013
Public Disclosure: August 28, 2013
Vulnerability Type: Improper Access Control [CWE-284]
CVE Reference: CVE-2013-5027
Risk Level: High
CVSSv2 Base Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Solution Status: Fixed by Vendor
Discovered and Provided: High-Tech Bridge Security Research Lab

Advisory Details:
High-Tech Bridge SA Security Research Lab (penetration testing company) has discovered vulnerability in Collabtive, which can be exploited to gain complete control over the application.

1) Improper Access Control in Collabtive: CVE-2013-5027
The vulnerability exists due to improper access restrictions to the third installation step after successfully installing the application. A remote attacker can send a specially crafted HTTP POST request to the "/install.php" script and create a new user with administrative privileges. The installation script is not deleted after application installation and is publicly available by default.
The following exploitation example creates a user with login "newadmin" and password "newpass":
<form action="http://[host]/install.php?action=step3" method="post" name="main">
<input type="hidden" name="name" value="newadmin">
<input type="hidden" name="pass" value="newpass">
<input type="submit" id="btn">

Update to Collabtive 1.1

More Information:

[1] High-Tech Bridge Advisory HTB23169 - - Improper Access Control in Collabtive.
[2] Collabtive - – Collabtive is a cloud based groupware easy and efficient for your projects.
[3] Common Vulnerabilities and Exposures (CVE) - - international in scope and free for public use, CVE® is a dictionary of publicly known information security vulnerabilities and exposures.
[4] Common Weakness Enumeration (CWE) - - targeted to developers and security practitioners, CWE is a formal list of software weakness types.