OutStart Participate Enterprise Multiple Access Validation Vulnerabilities
BID:12752
Info
OutStart Participate Enterprise Multiple Access Validation Vulnerabilities
| Bugtraq ID: | 12752 |
| Class: | Access Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Mar 08 2005 12:00AM |
| Updated: | Mar 08 2005 12:00AM |
| Credit: | Discovery is credited to Altrus <[email protected]>. |
| Vulnerable: |
OutStart Participate Enterprise 3 |
| Not Vulnerable: | |
Discussion
OutStart Participate Enterprise Multiple Access Validation Vulnerabilities
Participate Enterprise is reported prone to multiple access validation vulnerabilities. These issues may allow remote attackers to disclose sensitive information and corrupt and delete data that can ultimately lead to a denial of service condition.
The following specific issues were identified:
An attacker can browse the directory tree and disclose sensitive information.
An attacker can rename arbitrary objects.
An attacker can delete arbitrary objects as well.
All versions of Participate Enterprise are considered vulnerable at the moment.
Participate Enterprise is reported prone to multiple access validation vulnerabilities. These issues may allow remote attackers to disclose sensitive information and corrupt and delete data that can ultimately lead to a denial of service condition.
The following specific issues were identified:
An attacker can browse the directory tree and disclose sensitive information.
An attacker can rename arbitrary objects.
An attacker can delete arbitrary objects as well.
All versions of Participate Enterprise are considered vulnerable at the moment.
Exploit / POC
OutStart Participate Enterprise Multiple Access Validation Vulnerabilities
An exploit is not required.
The following proof of concept examples are available:
To browse the directory tree:
http://www.example.com/pe/repository/displaynavigator.jsp?rootFolder=101
To rename an object:
http://www.example.com/pe/repository/include/renamepopup.jsp?selectedObject=101
To delete an object:
http://www.example.com/pe/repository/displaydeletenavigator.jsp?selectedObjectsCSV=101
An exploit is not required.
The following proof of concept examples are available:
To browse the directory tree:
http://www.example.com/pe/repository/displaynavigator.jsp?rootFolder=101
To rename an object:
http://www.example.com/pe/repository/include/renamepopup.jsp?selectedObject=101
To delete an object:
http://www.example.com/pe/repository/displaydeletenavigator.jsp?selectedObjectsCSV=101
Solution / Fix
OutStart Participate Enterprise Multiple Access Validation Vulnerabilities
Solution:
It has been confirmed that the vendor has released upgrades dealing with these issues. It is advised that users contact the vendor for more information on the upgraded versions and obtaining them.
Solution:
It has been confirmed that the vendor has released upgrades dealing with these issues. It is advised that users contact the vendor for more information on the upgraded versions and obtaining them.
References
OutStart Participate Enterprise Multiple Access Validation Vulnerabilities
References:
References:
- Home Page (Outstart Inc)
- PE Multiple Remote Access Validation Vulnerabilities (Altrus
)