Home / vulnerabilitiesPDF  

Web Encryption Extension Authentication Bypass

Posted on 29 July 2014
Source : packetstormsecurity.org Link

 

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Revision: 1.0
Last Updated: 25 July 2014
First Published: 25 July 2014

Summary:
A security issue was found in the Web Encryption Extension.

Authenticated users are able to modify the content of https request
fields to insert code into the pipeline mechanism of PHP.

Severity: High

Affected Software Versions:

All versions of the Web Encryption Extension prior to version 3.0

Impact:

Authenticated users of the Web Encryption Extension are able to
inject code into user provided input, that will be executed with
web server permissions.

Fixes:

The vulnerability has been fixed in WEE version 3.0, upgrades to
this version must replace all active instances of WEE.

The following downloads are available:

https://senderek.ie/downlaods/latest/wee-3.0.tar
https://senderek.ie/downloads/release/webmail/wee-roundcube.tar
https://senderek.ie/downloads/release/cloud/wee-owncloud.tar
https://senderek.ie/downloads/release/db/wee-phpmyadmin.tar
https://senderek.ie/downloads/release/contact/securecontact.tar
https://senderek.ie/downloads/release/webmail/wee-atmailopen.tar
https://senderek.ie/downloads/release/webmail/wee-vtiger.tar

Risk Mitigation:

While using vulnerable versions of WEE, users are advised to disable
non-authenticated access like guest and demo accounts to the software.

(c) 2014 Senderek Web Security

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
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=wGyi
-----END PGP SIGNATURE-----

 

TOP