---------------------------------------------------------------------- Want a new job? http://secunia.com/secunia_security_specialist/ http://secunia.com/hardcore_disassembler_and_reverse_engineer/ International Partner Manager - Project Sales in the IT-Security Industry: http://corporate.secunia.com/about_secunia/64/ ---------------------------------------------------------------------- TITLE: Affinium Campaign Multiple Vulnerabilities SECUNIA ADVISORY ID: SA31280 VERIFY ADVISORY: http://secunia.com/advisories/31280/ CRITICAL: Moderately critical IMPACT: Cross Site Scripting, Manipulation of data, Exposure of system information, Exposure of sensitive information, DoS WHERE: >From remote SOFTWARE: Affinium Campaign 7.x http://secunia.com/product/19385/ DESCRIPTION: Some vulnerabilities have been reported in Affinium Campaign, which can be exploited by malicious people to disclose potentially sensitive information, manipulate certain data, conduct cross-site scripting and script insertion attacks, or cause a DoS (Denial of Service). 1) An error within the listener server can be exploited to cause the server to crash via a specially crafted packet. 2) Input passed to the CampaignListener web page (using e.g. an ActiveX control) is not properly sanitised before being stored in the status log. This can be exploited to insert arbitrary HTML and script code, which will be executed in a administrator's browser session in context of an affected site when a malicious status log is viewed. 3) Input passed to the title field and to the "PageName" and "url" parameters in the bookmarks web page is not properly sanitised before being used. This can be exploited to insert arbitrary HTML and script code, which will be executed in a user's browser session in context of an affected site e.g. when a bookmark is edited. 4) Input passed to the "displayIcon" parameter in Campaign/updateOfferTemplateSubmit.do is not properly sanitised before being used. This can be exploited to insert arbitrary HTML and script code, which will be executed in a user's browser session in context of an affected site when viewing a malicious page. 5) An input validation error when processing requests to create a new folder can be exploited to e.g. create folders or files in arbitrary locations via directory traversal sequences. 6) An input validation error in Campaign/CampaignListener can be exploited to e.g. list files in arbitrary locations via a specially crafted request from the application's ActiveX control. 7) Input passed to the "id" parameter in Campaign/campaignDetails.do and Campaign/offerDetails.do, to the "function" parameter in Campaign/Campaign, to the "sessionID" parameter in Campaign/runAllFlowchart.do, to the "actionType" parameter in Campaign/updateOfferTemplatePage.do, to the "Frame" parameter in Campaign/Campaign, and to the "affiniumUserName" parameter in manager/jsp/test.jsp and Campaign/main.do is not properly sanitised before being returned to a user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. The vulnerabilities are reported in version 7.2.1.0.55. Other versions may also be affected. SOLUTION: The vendor has reportedly issued patches. PROVIDED AND/OR DISCOVERED BY: 1, 5) Neil Kettle and Tim Brown, Portcullis Computer-Security Ltd. 2, 3, 4, 6, 7) Tim Brown, Portcullis Computer-Security Ltd. ORIGINAL ADVISORY: http://www.portcullis.co.uk/286.php http://www.portcullis.co.uk/287.php http://www.portcullis.co.uk/288.php http://www.portcullis.co.uk/289.php http://www.portcullis.co.uk/290.php http://www.portcullis.co.uk/291.php http://www.portcullis.co.uk/292.php ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------