Document Title: =============== eFront Community++ v3.6.10 - Multiple Web Vulnerabilities References (Source): ==================== http://www.vulnerability-lab.com/get_content.php?id=421 Release Date: ============= 2012-02-09 Vulnerability Laboratory ID (VL-ID): ==================================== 421 Product & Service Introduction: =============================== Tailored with larger organizations in mind, eFront Community ++ offers solutions for the management of companies most valued asset - the people. Based on a coherent approach to human capital management which keeps the workforce actively engaged, the eFront Community ++ platform offers the means of aligning learning programs with business goals to cultivate employee skills and knowledge associated with business performance. eFront Community ++ builds on top of eFront Educational. (Copy of the Vendor Homepage: http://efrontlearning.net/product/efront-Community ++.html) Abstract Advisory Information: ============================== A Vulnerability Lab Researcher discovered multiple persistent web vulnerabilities on eFronts Community ++ v3.6.10 Application. Vulnerability Disclosure Timeline: ================================== 2012-02-07: Public or Non-Public Disclosure Discovery Status: ================= Published Affected Product(s): ==================== eFront Product: Communiy ++ 3.6.10 Exploitation Technique: ======================= Remote Severity Level: =============== Medium Technical Details & Description: ================================ Multiple persistent input validation vulnerabilities are detected on eFronts Community++ application v3.6.10. The vulnerability allows an remote attacker or local low privileged user account to inject/implement malicious persistent script code. Successful exploitation with low required user inter action can result in session hijacking or persistent context manipulations. Vulnerable Module(s): [+] Forums - Title Name [+] Pools - Name & Questions [+] Calender Show Interval [+] Registration Key - Input/Output [+] Themes - Name Input and Output Listing Picture(s): ../1.png ../2.png ../3.png ../4.png ../5.png ../6.png ../7.png Proof of Concept (PoC): ======================= The vulnerabilities can be exploited by remote attacker with low or high required user inter action. For demonstration or reproduce ...
![]() |
0 Subforums, 0 Topics, 0 Messages | Never | ...or | ...or
No data found | |||