Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Summary
Title OneOrZero AIMS authentication bypass and SQLi vulnerabilities
Informations
Name VU#800227 First vendor Publication 2011-10-13
Vendor VU-CERT Last vendor Modification 2011-10-13
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 10 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Vulnerability Note VU#800227

OneOrZero AIMS authentication bypass and SQLi vulnerabilities

Overview

OneOrZero Action & Information Management System (AIMS) is vulnerable to an authentication bypass and SQL injection.

I. Description

According to the vendor's website:

"OneOrZero AIMS is a powerful enterprise ready suite that includes a help desk, knowledge base, time manager and reporting system supported by a highly configurable and extensible Action & Information Management System that allows you to 'build your own system' on the fly."

AIMS is susceptible to an authentication bypass. An attacker can generate a session cookie for $_COOKIE['oozimsrememberme'] and log in as an administrator without providing a password.

AIMS is also susceptible to SQL injection. On line 136 of lib\ooz_access.php the $cookieName variable that originates from an attacker controllable cookie is passed to a SQL statement without any filtering:

    $sql = "SELECT * FROM " . OOZ_SET_TABLE_PREFIX . "users WHERE user_name = '" . $cookieName . "'";
    $userResult = DB::query($sql, DSN, OOZ_SET_SHOW_SQL);
 

II. Impact

An unauthenticated remote attacker may be able to bypass authentication or leak database information.

III. Solution

We are currently unaware of a practical solution to this problem.

Vendor Information

VendorStatusDate NotifiedDate Updated
OneOrZeroAffected2011-10-12

References

http://www.oneorzero.com/
http://en.securitylab.ru/lab/PT-2011-20
http://en.securitylab.ru/lab/PT-2011-21

Credit

Thanks to Yuri Goltsev of Positive Technologies for reporting this vulnerability.

This document was written by Jared Allar.

Other Information

Date Public:2011-10-12
Date First Published:2011-10-13
Date Last Updated:2011-10-13
CERT Advisory: 
CVE-ID(s): 
NVD-ID(s): 
US-CERT Technical Alerts: 
Severity Metric:0.07
Document Revision:7

Original Source

Url : http://www.kb.cert.org/vuls/id/800227

CWE : Common Weakness Enumeration

% Id Name
50 % CWE-287 Improper Authentication
50 % CWE-89 Improper Sanitization of Special Elements used in an SQL Command ('SQL Injection') (CWE/SANS Top 25)

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1

OpenVAS Exploits

Date Description
2011-10-18 Name : OneOrZero AIMS Security Bypass and SQL Injection Vulnerabilities
File : nvt/gb_OneOrZero_50107.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
76855 OneOrZero Action & Information Management System (AIMS) oozimsrememberme ...

76854 OneOrZero Action & Information Management System (AIMS) lib/ooz_access.ph...

OneOrZero Action & Information Management System (AIMS)contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the lib/ooz_access.php script not properly sanitizing user-supplied input to the 'cookieName' parameter. This may allow an attacker to inject or manipulate SQL queries in the back-end database, allowing for the manipulation or disclosure of arbitrary data.