[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
FileBound - Privilege Escalation Vulnerability - Security Advisory - SOS-12-010
Sense of Security - Security Advisory - SOS-12-010
Release Date. 10-Oct-2012
Last Update. -
Vendor Notification Date. 14-Aug-2012
Product. FileBound On-Site
Affected versions. All versions prior to 6.2
Severity Rating. High
Impact. Privilege escalation
Attack Vector. From remote with authentication
Solution Status. Vendor patch
CVE reference. CVE - not yet assigned
The FileBound On-Site document management application is
vulnerable to a privilege escalation attack by sending a
modified password request to the FileBound web service.
By modifying the UserID value you can reset the password
of any local user in the application without requiring
Proof of Concept.
Authenticate to FileBound via the following web service
method and SOAP request:
After authentication a request can be sent to the following
administrator's password reset web service method and
By modifying the UserID value the password can be reset for
any existing user in the system. A response code of -1
confirms the password reset was successful.
Install the latest vendor patch.
Nathaniel Carew from Sense of Security Labs.
Sense of Security is a leading provider of information security and
risk management solutions. Our team has expert skills in assessment
and assurance, strategy and architecture, and deployment through to
ongoing management. We are Australia's premier application penetration
testing firm and trusted IT security advisor to many of the country's
Sense of Security Pty Ltd
Level 8, 66 King St
Sydney NSW 2000
T: +61 (0)2 9290 4444
F: +61 (0)2 9290 4455
The latest version of this advisory can be found at:
Other Sense of Security advisories can be found at: