Omnidocs" Enterprise Document Management Platform Vulnerabilitie
Reporter | Title | Published | Views | Family All 10 |
---|---|---|---|---|
![]() | Omnidocs - Multiple Vulnerabilities | 27 Sep 201100:00 | β | exploitdb |
![]() | CVE-2011-3645 | 27 Sep 201119:55 | β | nvd |
![]() | Omnidocs Privilege Escalation / Direct Object Access | 26 Sep 201100:00 | β | packetstorm |
![]() | Omnidocs - Multiple Vulnerabilities | 27 Sep 201100:00 | β | exploitpack |
![]() | Omnidocs - Multiple Vulnerability | 1 Jul 201400:00 | β | seebug |
![]() | CVE-2011-3645 | 27 Sep 201119:55 | β | cve |
![]() | CVE-2011-3645 | 27 Sep 201119:00 | β | cvelist |
![]() | Design/Logic Flaw | 27 Sep 201119:55 | β | prion |
![]() | [CVE-2011-3645] Multiple vulnerability in "Omnidocs" | 26 Sep 201100:00 | β | securityvulns |
![]() | Web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl) | 26 Sep 201100:00 | β | securityvulns |
--------------------------------------------------------------------
# Exploit Title: Multiple Vulnerability in "Omnidocs"
# Date: 24 Sep 2011
# Author: Sohil Garg
# Software Link: http://www.newgensoft.com/omnidocs.asp
# Version: All
# Tested on: Apache-Coyote/1.1
# CVE : CVE-2011-3645
---------------------------------------------------
"Omnidocs" Multiple vulnerability.
---------------------------------------------------
By :Sohil Garg
Email :[emailΒ protected]
---------------------------------------------------
Product Description:
OmniDocs is an Enterprise Document Management (EDM) platform for creating, capturing, managing, delivering and archiving large volumes of documents and
contents. Also integrates seamlessly with other enterprise applications.
------------------
Vulnerability
------------------
1.Vulnerbility Type
Privilege escalation
Affected URL:
http://serverIP/omnidocs/doccab/doclist.jsp?DocListFolderId=927964&FolderType=G&FolderRights=010000000&FolderName=1234&FolderOwner=test&FolderLocation=G&Fold
erAccessType=I&ParentFolderIndex=100&FolderPathFlag=Y&Fetch=5&VolIndex=1&VolIndex=1
Vulnerable Parameter:
FolderRights
Exploit
Omnidocs application does not validate 'FolderRights' parameter. This parameter could be modified to '111111111' to get full access including rights to add
documents, add folders, delete folders and place orders.
2.Vulnerability Type
Direct Object Access
Sample URL:
http://serverIP/omnidocs/doccab/userprofile/editprofile.jsp
Vulnerable Parameter:
UserIndex
Exploit:
Omnidocs application does not validate 'UserIndex' parameter. 'UserIndex' parameter is used to access the personal setting page. This parameter can be
changed to other valid numbers thereby gaining access to view or change other user's personal settings.
Timeline:
Notified Vendor: 01-Sep-2011
No response received from vendor for 3 weeks
Public Disclosure: 23-Sep-2011
# 0day.today [2018-01-05] #
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. ContactΒ us for a demo andΒ discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo