============================================ Vulnerability ID: HTB22519 Reference: http://www.htbridge.ch/advisory/xss_vulnerability_in_dt_centrepiece.html Product: DT Centrepiece Vendor: DT Services ( http://www.dt.net.nz/ ) Vulnerable Version: 4.5 and Probably Prior Versions Vendor Notification: 22 July 2010 Vulnerability Type: XSS (Cross Site Scripting) Status: Not Fixed, Vendor Alerted, Awaiting Vendor Response Risk level: Medium Credit: High-Tech Bridge SA - Ethical Hacking & Penetration Testing (http://www.htbridge.ch/) Vulnerability Details: User can execute arbitrary JavaScript code within the vulnerable application. The vulnerability exists due to failure in the "/search.asp" script to properly sanitize user-supplied input in "searchFor" variable. Successful exploitation of this vulnerability could result in a compromise of the application, theft of cookie-based authentication credentials, disclosure or modification of sensitive data. An attacker can use browser to exploit this vulnerability. The following PoC is available: http://host/search.asp?searchFor=%22%3E%3Cscript%3Ealert%28document.cookie%29%3C/script%3E ============================================ Vulnerability ID: HTB22520 Reference: http://www.htbridge.ch/advisory/xss_vulnerability_in_dt_centrepiece_1.html Product: DT Centrepiece Vendor: DT Services ( http://www.dt.net.nz/ ) Vulnerable Version: 4.5 and Probably Prior Versions Vendor Notification: 22 July 2010 Vulnerability Type: XSS (Cross Site Scripting) Status: Not Fixed, Vendor Alerted, Awaiting Vendor Response Risk level: Medium Credit: High-Tech Bridge SA - Ethical Hacking & Penetration Testing (http://www.htbridge.ch/) Vulnerability Details: User can execute arbitrary JavaScript code within the vulnerable application. The vulnerability exists due to failure in the "login.asp" script to properly sanitize user-supplied input in "c" variable. Successful exploitation of this vulnerability could result in a compromise of the application, theft of cookie-based authentication credentials, disclosure or modification of sensitive data. An attacker can use browser to exploit this vulnerability. The following PoC is available: http://host/login.asp?c=/%22%3E%3Cscript%3Ealert%28document.cookie%29%3C/script%3E ============================================ Vulnerability ID: HTB22521 Reference: http://www.htbridge.ch/advisory/xss_vulnerability_in_dt_centrepiece_2.html Product: DT Centrepiece Vendor: DT Services ( http://www.dt.net.nz/ ) Vulnerable Version: 4.5 and Probably Prior Versions Vendor Notification: 22 July 2010 Vulnerability Type: XSS (Cross Site Scripting) Status: Not Fixed, Vendor Alerted, Awaiting Vendor Response Risk level: Medium Credit: High-Tech Bridge SA - Ethical Hacking & Penetration Testing (http://www.htbridge.ch/) Vulnerability Details: User can execute arbitrary JavaScript code within the vulnerable application. The vulnerability exists due to failure in the /register.asp script to properly sanitize user-supplied input in multiple variables. Successful exploitation of this vulnerability could result in a compromise of the application, theft of cookie-based authentication credentials, disclosure or modification of sensitive data. An attacker can use browser to exploit this vulnerability. The following PoC is available:
Vulnerability ID: HTB22522 Reference: http://www.htbridge.ch/advisory/application_logic_error_in_dt_centrepiece.html Product: DT Centrepiece Vendor: DT Services ( http://www.dt.net.nz/ ) Vulnerable Version: 4.5 and Probably Prior Versions Vendor Notification: 22 July 2010 Vulnerability Type: Application Logic Error Status: Not Fixed, Vendor Alerted, Awaiting Vendor Response Risk level: Low Credit: High-Tech Bridge SA - Ethical Hacking & Penetration Testing (http://www.htbridge.ch/) Vulnerability Details: The user can activate an arbitrary account. The system account is activated, has a predictable URL. This allows the user to activate any account without receiving the activation email. The following PoC is available: http://host/activate.asp?p=USERNAME Vulnerability ID: HTB22523 Reference: http://www.htbridge.ch/advisory/application_logic_error_in_dt_centrepiece_1.html Product: DT Centrepiece Vendor: DT Services ( http://www.dt.net.nz/ ) Vulnerable Version: 4.5 and Probably Prior Versions Vendor Notification: 22 July 2010 Vulnerability Type: Application Logic Error in the Authentication Mechanism Status: Not Fixed, Vendor Alerted, Awaiting Vendor Response Risk level: High Credit: High-Tech Bridge SA - Ethical Hacking & Penetration Testing (http://www.htbridge.ch/) Vulnerability Details: The user can get access to the account of an arbitrary user. When a user logs in, the remember password system puts predictable data in the cookie. An attacker can use browser to exploit this vulnerability. The following PoC is available: Just put this values in cookie: MM_Remember_Username=USERNAME