Kony EMM 1.2 Insecure Direct Object Reference

Type packetstorm
Reporter Michael Hendrickx
Modified 2015-02-23T00:00:00


Product: Enterprise Mobile Management  
Vendor: Kony  
Vulnerable Version(s): Kony EMM 1.2 and probably older versions   
Tested Version: Drupal Kony EMM 1.2   
Advisory Publication: 24 December 2014   
Vendor Notification: 8 December 2014   
Vulnerability Type: Insecure Direct Object References   
CVE Reference: CVE-2014-8487   
Risk Level: Low Solution   
Status: Solution not yet released   
Discovered and Provided: Michael Hendrickx, Help AG  
About the vendor:  
Kony EMM is a mobile management suite that allows organizations to manage employee's personal devices. It enables users to use their own device, or as often called BYOD or "bring your own device".  
About the vulnerability:  
During a pentest we discovered that a logged in user can access arbitrary information such as messages and phone information about every phone that's enrolled ot the solution. Often the user's colleagues:  
1.) Arbitrary Message retrieval  
By using the following URL:  
https://<kony_emm>/emm/selfservice/managedevice/getMessageBody?messageId=<message ID>  
Where <message ID> is an integer, an attacker can retrieve all messages sent to every mobile enrolled on the system.  
2.) Information retrieval  
By going to the following URL  
An attacker can retrieve earlier "requests". A request "task" is generated when a person requests more information about his/her phone, such as IMEI numbers, phone, last locations, etc.  
The vendor was notified, contact the vendor for the patch details  
[1] help AG middle East http://www.helpag.com/   
[2] Kony https://kony.com/