Archive for May, 2015

Vision HelpDesk – Various Modules Local File Inclusions (R911-0178)

Saturday, May 23rd, 2015

Type: Local File Inclusion(s)
Location: Local
Impact: High
Product: Vision HelpDesk
Website: https://www.visionhelpdesk.com
Vulnerable Version: All prior versions.
Fixed Version: 4.1.2
CVE: -
R911: 0178
Date: 2015-05-23
By: RACK911 Labs

Product Description:

Vision Helpdesk is the only web based Help Desk Software that allows to manage support for multiple companies at one place with single staff portal for all companies and each company having its own client portal.

Vulnerability Description:

There are various modules within the Vision HelpDesk that suffer from your typical local file inclusion that could lead to a compromise under certain circumstances. Most of the risk would be if the software was installed in a shared hosting environment which is a high probability as it is bundled with the popular Softaculous one-click installer.

Impact:

We have deemed this vulnerability to be rated as HIGH due to the fact that the entire help desk can be compromised if this vulnerability were successfully exploited.

Vulnerable Version:

This vulnerability was tested against Vision HelpDesk 4.0.2 and is believed to exist in all versions prior to the fixed builds below.

Fixed Version:

This vulnerability was patched in Vision HelpDesk 4.1.2.

Vendor Contact Timeline:

2015-05-17: Vendor contacted via email.
2015-05-17: Vendor confirms vulnerability.
2015-05-23: Vendor issues updates to all builds.
2015-05-23: RACK911 Labs issues security advisory.

Vision HelpDesk – User Images Input Validation Failure (R911-0177)

Saturday, May 23rd, 2015

Type: Input Validation Failure
Location: Remote
Impact: Low
Product: Vision HelpDesk
Website: https://www.visionhelpdesk.com
Vulnerable Version: All prior versions.
Fixed Version: 4.1.2
CVE: -
R911: 0177
Date: 2015-05-23
By: RACK911 Labs

Product Description:

Vision Helpdesk is the only web based Help Desk Software that allows to manage support for multiple companies at one place with single staff portal for all companies and each company having its own client portal.

Vulnerability Description:

Due to an input validation failure, it is possible for a malicious user to remove the profile images belonging to other users without authorization.

Impact:

We have deemed this vulnerability to be rated as LOW due to the fact that no sensitive information can be obtained if this vulnerability were to be exploited.

Vulnerable Version:

This vulnerability was tested against Vision HelpDesk 4.0.2 and is believed to exist in all versions prior to the fixed builds below.

Fixed Version:

This vulnerability was patched in Vision HelpDesk 4.1.2.

Vendor Contact Timeline:

2015-05-17: Vendor contacted via email.
2015-05-17: Vendor confirms vulnerability.
2015-05-23: Vendor issues updates to all builds.
2015-05-23: RACK911 Labs issues security advisory.

Vision HelpDesk 4 – Client Area XSS Vulnerabilities (R911-0176)

Friday, May 1st, 2015

Type: XSS
Location: Remote
Impact: High
Product: Vision HelpDesk
Website: http://www.thevisionworld.com/
Vulnerable Version: 4.0.0
Fixed Version: 4.0.2
CVE: -
R911: 176
Date: 2015-05-01
By: RACK911 Labs

Product Description:

Vision Helpdesk is the only web based Help Desk Software that allows to manage support for multiple companies at one place with single staff portal for all companies and each company having its own client portal.

Vulnerability Description:

There are numerous fields within the client area that accept HTML code that allows XSS attacks to be performed against staff when logged into the admin panel. The possibility to hijack an admin account by stealing cookies via an XSS attack is a real threat.

Impact:

We have deemed this vulnerability to be rated as HIGH due to the fact that staff / admin accounts can be hijacked.

Vulnerable Version:

This vulnerability was tested against Vision HelpDesk 4.0.0 and is believed to exist in all versions prior to the fixed builds below.

Fixed Version:

This vulnerability was patched in Vision HelpDesk 4.0.2.

Vendor Contact Timeline:

2015-04-22: Vendor contacted via email.
2015-04-23: Vendor confirms vulnerability.
2015-05-01: Vendor issues updates to all builds.
2015-05-01: RACK911 Labs issues security advisory.

IP.Board 3.3.x & 3.4.x – Messenger Directories Input Validation Failure (R911-0175)

Friday, May 1st, 2015

Type: Input Validation
Location: Remote
Impact: High
Product: IP.Board
Website: https://www.invisionpower.com/apps/board/
Vulnerable Version: 3.3.x & 3.4.x
CVE: -
R911: 0175
Date: 2015-05-01
By: RACK911 Labs

Product Description:

Invision Power Board (abbreviated IPB, IP.Board or IP Board) is an Internet forum software produced by Invision Power Services, Inc. It is written in PHP and primarily uses MySQL as a database management system, although support for other database engines is available.

Vulnerability Description:

Due to an input validation failure, it is possible for a malicious user to remove / add any message directory belonging to another user.

Impact:

We have deemed this vulnerability to be rated HIGH due to the fact that a malicious user can incrementally go through an IP.Board site and wipe out the default directory for messages.

Vulnerable Version:

This vulnerability was tested against IP.Board 3.4.7 and is believed to exist in all prior versions.

Fixed Version:

This vulnerability was patched in IP.Board 3.3.x & 3.4.x which can be downloaded from the vendors website:

http://community.invisionpower.com/blogs/entry/9729-ipboard-33x-34x-security-update/

Vendor Contact Timeline:

2015-04-23: Vendor contacted via email.
2015-04-24: Vendor confirms vulnerability.
2015-05-01: Vendor issues patches.
2015-05-01: RACK911 Labs issues security advisory.

IP.Board 3.3.x & 3.4.x – Send Messages Input Validation Failure (R911-0174)

Friday, May 1st, 2015

Type: Input Validation
Location: Remote
Impact: High
Product: IP.Board
Website: https://www.invisionpower.com/apps/board/
Vulnerable Version: 3.3.x & 3.4.x
CVE: -
R911: 0174
Date: 2015-05-01
By: RACK911 Labs

Product Description:

Invision Power Board (abbreviated IPB, IP.Board or IP Board) is an Internet forum software produced by Invision Power Services, Inc. It is written in PHP and primarily uses MySQL as a database management system, although support for other database engines is available.

Vulnerability Description:

Due to an input validation failure, it is possible for a malicious user to hijack any message belonging to another user.

Impact:

We have deemed this vulnerability to be rated HIGH due to the fact that a malicious user can intercept user conversations.

Vulnerable Version:

This vulnerability was tested against IP.Board 3.4.7 and is believed to exist in all prior versions.

Fixed Version:

This vulnerability was patched in IP.Board 3.3.x & 3.4.x which can be downloaded from the vendors website:

http://community.invisionpower.com/blogs/entry/9729-ipboard-33x-34x-security-update/

Vendor Contact Timeline:

2015-04-23: Vendor contacted via email.
2015-04-24: Vendor confirms vulnerability.
2015-05-01: Vendor issues patches.
2015-05-01: RACK911 Labs issues security advisory.