Executive Summary

Summary
Title AdvancePro Technologies Advanceware software suite vulnerable to privilege bypass
Informations
Name VU#704526 First vendor Publication 2013-09-03
Vendor VU-CERT Last vendor Modification 2013-09-10
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:S/C:P/I:N/A:N)
Cvss Base Score 4 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 8 Authentication Requires single instance
Calculate full CVSS 2.0 Vectors scores

Detail

Vulnerability Note VU#704526

AdvancePro Technologies Advanceware software suite vulnerable to privilege bypass

Original Release date: 03 Sep 2013 | Last revised: 10 Sep 2013

Overview

AdvancePro Technologies Advanceware software suite contains a privilege bypass vulnerability, resulting in information leakage (CWE-200).

Description

CWE-200: Information Exposure

AdvancePro Technologies Advanceware software suite contains a privilege bypass vulnerability, resulting in information leakage. The id value in the vulnerable site URL can be manipulated to show the contents of orders from other users. This may contain contact information for the customers, shipping information, and order details.

Impact

A remote authenticated attacker can manipulate the webserver URL of the vulnerable site running the Advanceware software suite, which could be used to result in information leakage.

Solution

AdvancePro has updated the software suite to mitigate this vulnerability. Customers that created/updated their AdvancePro website template after July 26, 2013 have already had a fix applied and are not susceptible to this vulnerability. Sites that run the Legacy Template from AdvanceWare or created/updated their sites prior to July 26, 2013 are strongly encouraged to move to the new template. All sites are set to be automatically patched in a timely manner. Customers can request a status update or schedule a patch by contacting support@advanceprotech.com or by visiting the AdvancePro Technologies website and accessing their customer support ticket portal.

Further details can also be found on the AdvancePro Technologies blog.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
Advance Pro TechnologiesAffected26 Jul 201310 Sep 2013
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

GroupScoreVector
Base7.5AV:N/AC:L/Au:S/C:C/I:P/A:N
Temporal6.2E:F/RL:OF/RC:C
Environmental1.6CDP:ND/TD:L/CR:ND/IR:ND/AR:ND

References

  • http://cwe.mitre.org/data/definitions/200.html
  • http://www.advanceprotech.com/
  • http://advanceware.net/
  • http://www.advanceprotech.com/2013/09/09/13295/

Credit

Thanks to the reporter that wishes to remain anonymous.

This document was written by Adam Rauf.

Other Information

  • CVE IDs:CVE-2013-3596
  • Date Public:03 Sep 2013
  • Date First Published:03 Sep 2013
  • Date Last Updated:10 Sep 2013
  • Document Revision:24

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Original Source

Url : http://www.kb.cert.org/vuls/id/704526

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-264 Permissions, Privileges, and Access Controls

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1

Alert History

If you want to see full details history, please login or register.
0
1
2
3
Date Informations
2013-09-10 17:21:49
  • Multiple Updates
2013-09-09 21:24:54
  • Multiple Updates
2013-09-08 21:24:06
  • Multiple Updates
2013-09-04 00:21:29
  • First insertion