[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Omnidocs Multiple Vulnerability

Author
Sohil Garg
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-16961
Category
web applications
Date add
26-09-2011
Platform
jsp
--------------------------------------------------------------------
# Exploit Title: Multiple Vulnerability in "Omnidocs"
# Date: 24 Sep 2011
# Author: Sohil Garg
# Software Link: http://www.newgensoft.com/omnidocs.asp
# Version: All
# Tested on: Apache-Coyote/1.1
# CVE : CVE-2011-3645

---------------------------------------------------
"Omnidocs" Multiple vulnerability.
---------------------------------------------------
By  :Sohil Garg
Email :sohil_garg@yahoo.co.in
---------------------------------------------------

Product Description:
OmniDocs is an Enterprise Document Management (EDM) platform for creating, capturing, managing, delivering and archiving large volumes of documents and
 
contents. Also integrates seamlessly with other enterprise applications.

------------------
Vulnerability
------------------

1.Vulnerbility Type
Privilege escalation
 
Affected URL:
http://serverIP/omnidocs/doccab/doclist.jsp?DocListFolderId=927964&FolderType=G&FolderRights=010000000&FolderName=1234&FolderOwner=test&FolderLocation=G&Fold
erAccessType=I&ParentFolderIndex=100&FolderPathFlag=Y&Fetch=5&VolIndex=1&VolIndex=1

Vulnerable Parameter:
FolderRights
 
Exploit
Omnidocs application does not validate 'FolderRights' parameter. This parameter could be modified to '111111111' to get full access including rights to add
documents, add folders, delete folders and place orders.
 
 
 
2.Vulnerability Type
Direct Object Access
 
Sample URL:
http://serverIP/omnidocs/doccab/userprofile/editprofile.jsp
 
Vulnerable Parameter:
UserIndex
 
Exploit:
Omnidocs application does not validate 'UserIndex' parameter. 'UserIndex' parameter is used to access the personal setting page. This parameter can be
changed to other valid numbers thereby gaining access to view or change other user's personal settings.
 
 
Timeline:
Notified Vendor: 01-Sep-2011
No response received from vendor for 3 weeks
Public Disclosure: 23-Sep-2011



#  0day.today [2024-07-07]  #