NACElink CS Manager - Persistent Web Vulnerability

Type vulnerlab
Reporter Vulnerability Laboratory [Research Team] - the_storm (
Modified 2012-05-16T00:00:00


                                            Document Title:
NACElink CS Manager - Persistent Web Vulnerability

References (Source):

Release Date:

Vulnerability Laboratory ID (VL-ID):

Common Vulnerability Scoring System:

Product & Service Introduction:
NACElink Career Services Manager (CSM)™ offers everything you need to smoothly run a career services office.
This powerful and customizable career office management tool allows career professionals to spend more time 
making personal connections with students and employers and less time in front of a computer.

Exclusive software of the NACElink network
The NACElink Network, the result of an alliance among the National Association of Colleges and Employers, 
DirectEmployers Association, and Symplicity Corporation, is a national recruiting network serving the needs 
of colleges, employers and job candidates.

The NACElink Network is the first network of its kind that was formed with commitment for ensuring the privacy 
of student data, allowing no commercial marketing to students or employers, and focusing on the career center 
as the provider of jobs and connections to employers.

(Copy of the Vendor Homepage: )

Abstract Advisory Information:
The Vulnerability Laboratory Research Team discovered a persistent Vulnerability in the NACElink Career Services Manager

Vulnerability Disclosure Timeline:
2012-05-17:	Public or Non-Public Disclosure

Discovery Status:

Exploitation Technique:

Severity Level:

Technical Details & Description:
A critical persistent web vulnerability is detected in NACElinks Career Services Manager (CSM).
A user(attacker) will be asked after register to upload his resume in order to user the application 
to apply for different jobs. This resume is getting reviewed by the administrator, and then the user can apply 
to any job. The attacker can inject scipt code as the name of the resume. For example, the attacker can make the 
name of the resume as <h1>resume</h1>. The script code will get injected into the page and it will be executed (persistent). 
If the attacker injects a code to hijack the session, while the administrator is processing to check the resume, the session 
can be transfered and the attacker can login as the administrator. Successful exploitation of the vulnerability results in 
session hijacking admin/mod/customer, persistent panel context manipulation or persistent client exploitation.

Vulnerable Module(s):
				[+] Resume File Upload & Listing


Security Risk:
The security risk of the persistent web vulnerability is estimated as medium(+).

Credits & Authors:
Vulnerability Laboratory [Research Team]  -    the_storm (

Disclaimer & Information:
The information provided in this advisory is provided as it is without any warranty. Vulnerability-Lab disclaims all warranties, 
either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-
Lab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business 
profits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some 
states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation 
may not apply. We do not approve or encourage anybody to break any vendor licenses, policies, deface websites, hack into databases 
or trade with fraud/stolen material.

Domains:   	-			       -
Contact: 	- 	       -
Section: 	- 		       -
Social:!/vuln_lab 		- 	       -
Feeds:	-   -

Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory. 
Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other 
media, are reserved by Vulnerability-Lab Research Team or its suppliers. All pictures, texts, advisories, sourcecode, videos and 
other information on this website is trademark of vulnerability-lab team & the specific authors or managers. To record, list (feed), 
modify, use or edit our material contact ( or to get a permission.

    				   	Copyright © 2012 | Vulnerability Laboratory