Please disclose, thanks.
-- 
Regards,

Hakan Küsne
Head of Infoteam Security

Infoteam Informatique Technique SA
Rte André Piller 19, CH - 1762 Givisiez
Title:
======
Interspire Email Marketer - Remote Admin Authentication Bypass

Author:
=======
Hakan Küsne, Infoteam Security (CH)

CVE-ID:
=======
CVE-2017-14322

Risk Information:
=================
CVSS Base Score: 9.8
CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O

Timeline:
=========
2017-09-12 Vulnerability discovered
2017-09-12 Discovered vendor already fixed it but never communicated to 
clients, leaving hundreds vulnerable in the wild
2017-10-17 Public disclosure

Affected Products:
==================
Interspire Email Marketer prior to version 6.1.6

Vendor Homepage:
================
http://www.interspire.com/emailmarketer/

Details:
========
The function in charge of checking whether the user is already logged in 
init.php in Interspire Email Marketer (IEM) prior to 6.1.6 allows 
remote attackers to bypass authentication and obtain administrative 
access by using the IEM_CookieLogin cookie with a specially crafted 
value.
On top of that, if the customer doesn't have an annuel maintenance plan, 
the application says that it's on the last available version and there is no 
update.

The vulnerabilities were found during an incident response on a compromise 
instance of the application.

Proof of Concept:
=================
Details provided here : 
https://security.infoteam.ch/en/blog/posts/narrative-of-an-incident-response-from-compromise-to-the-publication-of-the-weakness.html
 

Fix:
====
Vendor has patched the vulnerability in version 6.1.6, but never communicated 
to it's customers about it specifically.
 

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Reply via email to