------------------------------------------------------------------------
Product: Enterprise Mobile Management
Vendor: Kony
Vulnerable Version(s): Kony EMM 1.2 and probably older versions
Tested Version: Drupal Kony EMM 1.2
Advisory Publication: 24 December 2014
Vendor Notification: 8 December 2014
Vulnerability Type: Insecure Direct Object References
CVE Reference: CVE-2014-8487
Risk Level: Low Solution
Status: Solution not yet released
Discovered and Provided: Michael Hendrickx, Help AG
------------------------------------------------------------------------
About the vendor:
Kony EMM is a mobile management suite that allows organizations to manage employee's personal devices. It enables users to use their own device, or as often called BYOD or "bring your own device".
About the vulnerability:
During a pentest we discovered that a logged in user can access arbitrary information such as messages and phone information about every phone that's enrolled ot the solution. Often the user's colleagues:
1.) Arbitrary Message retrieval
By using the following URL:
https://<kony_emm>/emm/selfservice/managedevice/getMessageBody?messageId=<message ID>
Where <message ID> is an integer, an attacker can retrieve all messages sent to every mobile enrolled on the system.
2.) Information retrieval
By going to the following URL
https://<kony_emm>/emm/selfservice/devicemgmt/getDeviceInfoTab.htm?requestId=<request_id>&..."
An attacker can retrieve earlier "requests". A request "task" is generated when a person requests more information about his/her phone, such as IMEI numbers, phone, last locations, etc.
-----------------------
Solution:
The vendor was notified, contact the vendor for the patch details
References:
[1] help AG middle East http://www.helpag.com/
[2] Kony https://kony.com/
{"id": "SECURITYVULNS:DOC:31870", "bulletinFamily": "software", "title": "CVE-2014-8487: Kony EMM insecurity Direct Object Reference", "description": "\r\n\r\n------------------------------------------------------------------------\r\nProduct: Enterprise Mobile Management\r\nVendor: Kony\r\nVulnerable Version(s): Kony EMM 1.2 and probably older versions \r\nTested Version: Drupal Kony EMM 1.2 \r\nAdvisory Publication: 24 December 2014 \r\nVendor Notification: 8 December 2014 \r\nVulnerability Type: Insecure Direct Object References \r\nCVE Reference: CVE-2014-8487 \r\nRisk Level: Low Solution \r\nStatus: Solution not yet released \r\nDiscovered and Provided: Michael Hendrickx, Help AG\r\n------------------------------------------------------------------------\r\n\r\nAbout the vendor:\r\nKony EMM is a mobile management suite that allows organizations to manage employee's personal devices. It enables users to use their own device, or as often called BYOD or "bring your own device".\r\n\r\nAbout the vulnerability:\r\nDuring a pentest we discovered that a logged in user can access arbitrary information such as messages and phone information about every phone that's enrolled ot the solution. Often the user's colleagues:\r\n\r\n1.) Arbitrary Message retrieval\r\nBy using the following URL:\r\n\r\nhttps://<kony_emm>/emm/selfservice/managedevice/getMessageBody?messageId=<message ID>\r\n\r\nWhere <message ID> is an integer, an attacker can retrieve all messages sent to every mobile enrolled on the system.\r\n\r\n2.) Information retrieval\r\n\r\nBy going to the following URL\r\n\r\nhttps://<kony_emm>/emm/selfservice/devicemgmt/getDeviceInfoTab.htm?requestId=<request_id>&..."\r\n\r\nAn attacker can retrieve earlier "requests". A request "task" is generated when a person requests more information about his/her phone, such as IMEI numbers, phone, last locations, etc.\r\n\r\n-----------------------\r\n\r\nSolution:\r\n\r\nThe vendor was notified, contact the vendor for the patch details\r\n\r\nReferences:\r\n\r\n[1] help AG middle East http://www.helpag.com/ \r\n[2] Kony https://kony.com/\r\n\r\n", "published": "2015-03-23T00:00:00", "modified": "2015-03-23T00:00:00", "cvss": {"score": 4.0, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:PARTIAL/I:NONE/A:NONE/"}, "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:31870", "reporter": "Securityvulns", "references": [], "cvelist": ["CVE-2014-8487"], "type": "securityvulns", "lastseen": "2018-08-31T11:10:58", "edition": 1, "viewCount": 80, "enchantments": {"score": {"value": 0.9, "vector": "NONE"}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2014-8487"]}, {"type": "packetstorm", "idList": ["PACKETSTORM:130486"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:VULN:14346"]}]}, "backreferences": {"references": [{"type": "cve", "idList": ["CVE-2014-8487"]}]}, "exploitation": null, "vulnersScore": 0.9}, "affectedSoftware": [], "immutableFields": [], "cvss2": {}, "cvss3": {}, "_state": {"dependencies": 1647589307, "score": 1659730939}}
{"packetstorm": [{"lastseen": "2016-12-05T22:22:21", "description": "", "published": "2015-02-23T00:00:00", "type": "packetstorm", "title": "Kony EMM 1.2 Insecure Direct Object Reference", "bulletinFamily": "exploit", "cvelist": ["CVE-2014-8487"], "modified": "2015-02-23T00:00:00", "id": "PACKETSTORM:130486", "href": "https://packetstormsecurity.com/files/130486/Kony-EMM-1.2-Insecure-Direct-Object-Reference.html", "sourceData": "`------------------------------------------------------------------------ \nProduct: Enterprise Mobile Management \nVendor: Kony \nVulnerable Version(s): Kony EMM 1.2 and probably older versions \nTested Version: Drupal Kony EMM 1.2 \nAdvisory Publication: 24 December 2014 \nVendor Notification: 8 December 2014 \nVulnerability Type: Insecure Direct Object References \nCVE Reference: CVE-2014-8487 \nRisk Level: Low Solution \nStatus: Solution not yet released \nDiscovered and Provided: Michael Hendrickx, Help AG \n------------------------------------------------------------------------ \n \nAbout the vendor: \nKony EMM is a mobile management suite that allows organizations to manage employee's personal devices. It enables users to use their own device, or as often called BYOD or \"bring your own device\". \n \nAbout the vulnerability: \nDuring a pentest we discovered that a logged in user can access arbitrary information such as messages and phone information about every phone that's enrolled ot the solution. Often the user's colleagues: \n \n1.) Arbitrary Message retrieval \nBy using the following URL: \n \nhttps://<kony_emm>/emm/selfservice/managedevice/getMessageBody?messageId=<message ID> \n \nWhere <message ID> is an integer, an attacker can retrieve all messages sent to every mobile enrolled on the system. \n \n2.) Information retrieval \n \nBy going to the following URL \n \nhttps://<kony_emm>/emm/selfservice/devicemgmt/getDeviceInfoTab.htm?requestId=<request_id>&...\" \n \nAn attacker can retrieve earlier \"requests\". A request \"task\" is generated when a person requests more information about his/her phone, such as IMEI numbers, phone, last locations, etc. \n \n----------------------- \n \nSolution: \n \nThe vendor was notified, contact the vendor for the patch details \n \nReferences: \n \n[1] help AG middle East http://www.helpag.com/ \n[2] Kony https://kony.com/ \n`\n", "cvss": {"score": 4.0, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:PARTIAL/I:NONE/A:NONE/"}, "sourceHref": "https://packetstormsecurity.com/files/download/130486/konyemm-insecure.txt"}], "cve": [{"lastseen": "2022-03-23T15:05:06", "description": "Kony Management (aka Enterprise Mobile Management or EMM) 1.2 and earlier allows remote authenticated users to read (1) arbitrary messages via the messageId parameter to selfservice/managedevice/getMessageBody or (2) requests via the requestId parameter to selfservice/devicemgmt/getDeviceInfoTab.htm.", "cvss3": {}, "published": "2015-02-24T15:59:00", "type": "cve", "title": "CVE-2014-8487", "cwe": ["CWE-200"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.0, "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-8487"], "modified": "2018-10-09T19:54:00", "cpe": ["cpe:/a:kony:enterprise_mobile_management:1.2"], "id": "CVE-2014-8487", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8487", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:a:kony:enterprise_mobile_management:1.2:*:*:*:*:*:*:*"]}], "securityvulns": [{"lastseen": "2021-06-08T18:44:50", "description": "PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.", "edition": 2, "cvss3": {}, "published": "2015-03-23T00:00:00", "title": "Web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)", "type": "securityvulns", "bulletinFamily": "software", "cvss2": {}, "cvelist": ["CVE-2014-9057", "CVE-2015-1165", "CVE-2015-1220", "CVE-2015-1218", "CVE-2015-1214", "CVE-2015-2275", "CVE-2015-1223", "CVE-2015-1231", "CVE-2015-1217", "CVE-2015-1592", "CVE-2015-1213", "CVE-2014-9472", "CVE-2015-1227", "CVE-2015-1464", "CVE-2015-2062", "CVE-2015-1228", "CVE-2015-1224", "CVE-2015-1215", "CVE-2015-1222", "CVE-2013-2184", "CVE-2014-8487", "CVE-2015-1219", "CVE-2015-1229", "CVE-2015-1221", "CVE-2015-1216", "CVE-2015-1238", "CVE-2015-1230", "CVE-2015-1306", "CVE-2015-1026"], "modified": "2015-03-23T00:00:00", "id": "SECURITYVULNS:VULN:14346", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:14346", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}]}