Please add this advisory to your archive. Thanks.
Title: Cross-Site Request Forgery (CSRF) Vulnerability in C2Box application Allows adding an Admin User or reset any user's password. Author: Wissam Bashour - Help AG Middle East Vendor: boxautomation(B.A.S) Product: C2Box Version: All versions below 4.0.0(r19171) Tested Version: Version 4.0.0(r19171) Severity: HIGH CVE Reference: CVE-2015-4460
B.A.S C2Box provides global solutions enabling full control and visibility over cash positions and managing domestic or cross border payment processes.
This Cross-Site Request Forgery vulnerability enables an anonymous attacker to add an admin account into the application. This leads to compromising the whole domain as the application normally uses privileged domain account to perform administration tasks. Also the attacker can reset any user's password after gaining the privileged account.
Cross-Site Request Forgery (CSRF) - https://www.owasp.org/index.php/Cross-Site_Request_Forgery_(CSRF)
Host the attached code in a webserver. Then send the link to the application Admin. The admin should be logged in when he clicks on the link. You can entice him to do that by using social engineering techniques. Say for example: Log into the application and click the following link to get free licenses
Discovered: June 10, 2015 Vendor Notification: June 10, 2015 Advisory Publication: June 27, 2015 Public Disclosure: June 27, 2015
Upgrade to the latest Build will fix this issue. The new version number is 15.6.22 Release date: June 22, 2015
Wissam Bashour Associate Security Analyst Help AG Middle East
 help AG middle East http://www.helpag.com/.  http://www.boxautomation.com/.  https://www.owasp.org/index.php/Cross-Site_Request_Forgery_(CSRF)  Common Vulnerabilities and Exposures (CVE) - http://cve.mitre.org/ - international in scope and free for public use, CVEВ® is a dictionary of publicly known information security vulnerabilities and exposures.