Vulnerability Laboratory [Research Team] - the_storm ([email protected])VULNERABLE:488
Document Title:
===============
NACElink CS Manager - Persistent Web Vulnerability
References (Source):
====================
http://www.vulnerability-lab.com/get_content.php?id=488
Release Date:
=============
2012-05-16
Vulnerability Laboratory ID (VL-ID):
====================================
488
Common Vulnerability Scoring System:
====================================
3.5
Product & Service Introduction:
===============================
NACElink Career Services Manager (CSM)™ offers everything you need to smoothly run a career services office.
This powerful and customizable career office management tool allows career professionals to spend more time
making personal connections with students and employers and less time in front of a computer.
Exclusive software of the NACElink network
The NACElink Network, the result of an alliance among the National Association of Colleges and Employers,
DirectEmployers Association, and Symplicity Corporation, is a national recruiting network serving the needs
of colleges, employers and job candidates.
The NACElink Network is the first network of its kind that was formed with commitment for ensuring the privacy
of student data, allowing no commercial marketing to students or employers, and focusing on the career center
as the provider of jobs and connections to employers.
(Copy of the Vendor Homepage: http://www.symplicity.com/career_services_manager_nacelink )
Abstract Advisory Information:
==============================
The Vulnerability Laboratory Research Team discovered a persistent Vulnerability in the NACElink Career Services Manager
Vulnerability Disclosure Timeline:
==================================
2012-05-17: Public or Non-Public Disclosure
Discovery Status:
=================
Published
Exploitation Technique:
=======================
Remote
Severity Level:
===============
Low
Technical Details & Description:
================================
A critical persistent web vulnerability is detected in NACElinks Career Services Manager (CSM).
A user(attacker) will be asked after register to upload his resume in order to user the application
to apply for different jobs. This resume is getting reviewed by the administrator, and then the user can apply
to any job. The attacker can inject scipt code as the name of the resume. For example, the attacker can make the
name of the resume as <h1>resume</h1>. The script code will get injected into the page and it will be executed (persistent).
If the attacker injects a code to hijack the session, while the administrator is processing to check the resume, the session
can be transfered and the attacker can login as the administrator. Successful exploitation of the vulnerability results in
session hijacking admin/mod/customer, persistent panel context manipulation or persistent client exploitation.
Vulnerable Module(s):
[+] Resume File Upload & Listing
Picture(s):
../1.png
../2.png
../3.png
Security Risk:
==============
The security risk of the persistent web vulnerability is estimated as medium(+).
Credits & Authors:
==================
Vulnerability Laboratory [Research Team] - the_storm ([email protected])
Disclaimer & Information:
=========================
The information provided in this advisory is provided as it is without any warranty. Vulnerability-Lab disclaims all warranties,
either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-
Lab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business
profits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some
states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation
may not apply. We do not approve or encourage anybody to break any vendor licenses, policies, deface websites, hack into databases
or trade with fraud/stolen material.
Domains: www.vulnerability-lab.com - www.vuln-lab.com - www.vulnerability-lab.com/register
Contact: [email protected] - [email protected] - [email protected]
Section: video.vulnerability-lab.com - forum.vulnerability-lab.com - news.vulnerability-lab.com
Social: twitter.com/#!/vuln_lab - facebook.com/VulnerabilityLab - youtube.com/user/vulnerability0lab
Feeds: vulnerability-lab.com/rss/rss.php - vulnerability-lab.com/rss/rss_upcoming.php - vulnerability-lab.com/rss/rss_news.php
Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory.
Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other
media, are reserved by Vulnerability-Lab Research Team or its suppliers. All pictures, texts, advisories, sourcecode, videos and
other information on this website is trademark of vulnerability-lab team & the specific authors or managers. To record, list (feed),
modify, use or edit our material contact ([email protected] or [email protected]) to get a permission.
Copyright © 2012 | Vulnerability Laboratory