Total Tests:

Improper Access Control in Collabtive

Advisory ID:HTB23169
Product:Collabtive
Vendor:Open Dynamics
Vulnerable Versions:1.0 and probably prior
Tested Version:1.0
Advisory Publication:July 31, 2013 [without technical details]
Vendor Notification:July 31, 2013
Vendor Fix:August 22, 2013
Public Disclosure:August 28, 2013
Latest Update:August 26, 2013
Vulnerability Type:Improper Access Control [CWE-284]
CVE Reference:CVE-2013-5027
Risk Level:High
CVSSv2 Base Score:7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Solution Status:Fixed by Vendor
Discovered and Provided:High-Tech Bridge Security Research Lab
 

Advisory Details:

High-Tech Bridge SA Security Research Lab has discovered vulnerability in Collabtive, which can be exploited to gain complete control over the application.

1) Improper Access Control in Collabtive: CVE-2013-5027
The vulnerability exists due to improper access restrictions to the third installation step after successfully installing the application. A remote attacker can send a specially crafted HTTP POST request to the "/install.php" script and create a new user with administrative privileges. The installation script is not deleted after application installation and is publicly available by default.
The following exploitation example creates a user with login "newadmin" and password "newpass":
<form action="http://[host]/install.php?action=step3" method="post" name="main">
<input type="hidden" name="name" value="newadmin">
<input type="hidden" name="pass" value="newpass">
<input type="submit" id="btn">
</form>

How to Detect Improper Access Control Vulnerabilities
Website Security Test
  • GDPR & PCI DSS Test
  • Website CMS Security Test
  • CSP & HTTP Headers Check
  • WordPress & Drupal Scanning
Try For Free

Solution:
Update to Collabtive 1.1

More Information:
http://collabtive.o-dyn.de/forum/viewtopic.php?f=11&t=11092
https://github.com/philippK-de/Collabtive/commit/a54b60c117ccb406d5aa48bf708c7393d94bfd79


References:
[1] High-Tech Bridge Advisory HTB23169 - https://www.immuniweb.com/advisory/HTB23169 - Improper Access Control in Collabtive.
[2] Collabtive - http://collabtive.o-dyn.de/ – Collabtive is a cloud based groupware easy and efficient for your projects.
[3] Common Vulnerabilities and Exposures (CVE) - http://cve.mitre.org/ - international in scope and free for public use, CVE® is a dictionary of publicly known information security vulnerabilities and exposures.
[4] Common Weakness Enumeration (CWE) - http://cwe.mitre.org - targeted to developers and security practitioners, CWE is a formal list of software weakness types.

Have additional information to submit?
Please feel free to send us any additional information related to this Advisory, such as vulnerable versions, additional exploitation details and conditions, patches and other relevant details.
Book a Call Ask a Question
Close
Talk to ImmuniWeb Experts
ImmuniWeb AI Platform
Have a technical question?

Our security experts will answer within
one business day. No obligations.

Have a sales question?
Email:
Tel: +41 22 560 6800 (Switzerland)
Tel: +1 720 605 9147 (USA)
*
*
*
Your data will stay private and confidential