ID CVE-2015-4626 Type cve Reporter cve@mitre.org Modified 2017-01-26T15:07:00
Description
B.A.S C2Box before 4.0.0 (r19171) relies on client-side validation, which allows remote attackers to "corrupt the business logic" via a negative value in an overdraft.
{"packetstorm": [{"lastseen": "2016-12-05T22:18:29", "description": "", "published": "2016-03-28T00:00:00", "type": "packetstorm", "title": "C2Box 4.0.0(r19171) Validation Bypass", "bulletinFamily": "exploit", "cvelist": ["CVE-2015-4626"], "modified": "2016-03-28T00:00:00", "id": "PACKETSTORM:136450", "href": "https://packetstormsecurity.com/files/136450/C2Box-4.0.0-r19171-Validation-Bypass.html", "sourceData": "`##################################### \nTitle: Validation Bypass in C2Box application allows user to input negative value \nAuthor: Harish Ramadoss \nVendor: boxautomation(B.A.S) \nProduct: C2Box \nVersion: All versions below 4.0.0(r19171) \nTested Version: Version 4.0.0(r19171) \nSeverity: Medium \nCVE Reference: 2015-4626 \n \n# About the Product: \nB.A.S C2Box provides global solutions enabling full control and visibility over cash positions and managing domestic or cross border payment processes. \n \n# Description: \nPerforming validation in client side code, generally JavaScript, provides no protection for server-side code. An attacker can simply disable JavaScript use a security testing proxy such as BurpSuite to bypass the client side validation. Invalidated input might corrupt business logic. \n \n# Vulnerability Class: \nUnvalidated Input - https://www.owasp.org/index.php/Unvalidated_Input \n \n# How to Reproduce: (POC): \nWhile creating an overdraft using the overdraft editor form on C2Box application disable JavaScript to disable client side validation and the value can be intercepted using a proxy and negative value can be inserted corrupting the business logic. \n \n# Disclosure: \nDiscovered: June 10, 2015 \nVendor Notification: June 10, 2015 \nAdvisory Publication: Mar 28, 2016 \nPublic Disclosure: Mar 28, 2016 \n \n# Solution: \nUpgrade to the latest Build will fix this issue. \nThe new version number is 15.6.22 \nRelease date: June 22, 2015 \n \n# credits: \nHarish Ramadoss \nSenior Security Analyst \nHelp AG Middle East \n \n#References: \n[1] help AG middle East http://www.helpag.com/. \n[2] http://www.boxautomation.com/. \n[3] https://www.owasp.org/index.php/Unvalidated_Input \n[4] Common Vulnerabilities and Exposures (CVE) - http://cve.mitre.org/ - international in scope and free for public use, CVE\u00ae is a dictionary of publicly known information security vulnerabilities and exposures. \n`\n", "cvss": {"score": 0.0, "vector": "NONE"}, "sourceHref": "https://packetstormsecurity.com/files/download/136450/c2box-bypass.txt"}]}