The_Arhitect Posted January 14, 2012 Report Posted January 14, 2012 Title:======Tine v2.0 Maischa - Cross Site Scripting VulnerabilityDate:=====2012-01-12References:===========http://www.vulnerability-lab.com/get_content.php?id=379VL-ID:=====379Introduction:=============Tine 2.0 is an open source project which combines groupware and CRM inone consistent interface. Tine 2.0 is web-basedand optimises collaboration and organisation of groups in a lastingmanner. Tine 2.0 unites all the advantages of opensource software with an extraordinarily high level of usability and anequally high standard of professional softwaredevelopment. This is what makes the difference between Tine 2.0 andmany other existing groupware solutions.Tine 2.0 includes address book, calendar, email, tasks, time trackingand CRM. Intelligent functions and links makecollaboration in Tine 2.0 a true pleasure and include: Synchronising mobile telephones, such as iPhone, Android, Nokiaand Windows Mobile VoiP integration Flexible assigning of authorisation rights Dynamic lists Search functions History PDF export(Copy from the Vendor Homepage: http://www.tine20.org/)Abstract:=========Vulnerability-Lab Team Researcher discovered multiple persistent WebVulnerabilities on the Tine v2.0 Content Management System.Report-Timeline:================2011-12-01: Vendor Notification2012-01-12: Public or Non-Public DisclosureStatus:========PublishedAffected Products:==================MetaWaysProduct: Tine CMS v2.0Exploitation-Technique:=======================RemoteSeverity:=========MediumDetails:========Multiple input validation vulnerabilities(persistent) are detected onTine v2.0 Content Management System. Local attackerscan include (persistent) malicious script code to manipulate specificuser/admin requests. The vulnerability allows anlocal privileged attacker to manipulate the appliance(application)via persistent script code inject. Successful exploitationcan result in session hijacking or persistent context manipulation on requests.Vulnerable Module(s): [+] New Contacts - Input & Output [+] Lead Name - Input & OutputPicture(s): ../1.png ../2.png ../3.pngRisk:=====The security risk of the persistent software vulnerability isestimated as medium(-).Credits:========Vulnerability Research Laboratory - Ucha Gobejishvili (longrifle0x)Disclaimer:===========The information provided in this advisory is provided as it is withoutany warranty. Vulnerability-Lab disclaims all warranties,either expressed or implied, including the warranties ofmerchantability and capability for a particular purpose.Vulnerability-Lab or its suppliers are not liable in any case of damage, includingdirect, indirect, incidental, consequential loss of businessprofits or special damages, even if Vulnerability-Lab or its suppliershave been advised of the possibility of such damages. Somestates do not allow the exclusion or limitation of liability forconsequential or incidental damages so the foregoing limitationmay not apply. Any modified copy or reproduction, including partiallyusages, of this file requires authorization from Vulnerability-Lab. Permission to electronically redistribute this alert in itsunmodified form is granted. All other rights, including the use ofother media, are reserved by Vulnerability-Lab or its suppliers. Copyright 2012|Vulnerability-Labsource: exploit-db.com Quote