var-200609-0101
Vulnerability from variot
Multiple cross-site scripting (XSS) vulnerabilities in vtiger CRM 4.2.4, and possibly earlier, allow remote attackers to inject arbitrary web script or HTML via the (1) description parameter in unspecified modules or the (2) solution parameter in the HelpDesk module. vtiger CRM Contains a cross-site scripting vulnerability.By any third party, via the following parameters Web Script or HTML May be inserted. (1) Unspecified module description Parameters (2) HelpDesk Module solution Parameters. The vtiger CRM is prone to HTML-injection and access-control-bypass vulnerabilities because the application fails to properly sanitize user-supplied input and effectively control access to administrative modules. Version 4.2.4 of vtiger CRM is reportedly affected; previous versions may be vulnerable as well.
Want to work within IT-Security?
Secunia is expanding its team of highly skilled security experts. We will help with relocation and obtaining a work permit.
Currently the following type of positions are available: http://secunia.com/quality_assurance_analyst/ http://secunia.com/web_application_security_specialist/ http://secunia.com/hardcore_disassembler_and_reverse_engineer/
TITLE: vtiger CRM Script Insertion and Administrative Modules Access
SECUNIA ADVISORY ID: SA21728
VERIFY ADVISORY: http://secunia.com/advisories/21728/
CRITICAL: Moderately critical
IMPACT: Security Bypass, Cross Site Scripting
WHERE:
From remote
SOFTWARE: vtiger CRM 4.x http://secunia.com/product/6211/
DESCRIPTION: Ivan Markovic has discovered some vulnerabilities in vtiger CRM, which can be exploited by malicious people to conduct script insertion attacks and bypass certain security restrictions.
1) Input passed to the "description" field in various modules when e.g. creating a contact and the "solution" field when an administrator modifies the solution in the HelpDesk modules isn't properly sanitised before being used. This can be exploited to inject arbitrary HTML and script code, which will be executed in a user's browser session in context of an affected site when the malicious user data is viewed.
2) An error in the access control verification can be exploited by a normal user to access administrative modules (e.g. the settings section) by accessing certain URLs directly.
The vulnerabilities have been confirmed in version 4.2.4.
Use another product.
PROVIDED AND/OR DISCOVERED BY: Ivan Markovic
ORIGINAL ADVISORY: http://www.security-net.biz/adv/D3906a.txt
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200609-0101", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "crm", "scope": "eq", "trust": 1.9, "vendor": "vtiger", "version": "4.2.4" }, { "model": "crm", "scope": "eq", "trust": 1.6, "vendor": "vtiger", "version": "4.2" }, { "model": "crm", "scope": "lte", "trust": 0.8, "vendor": "vtiger", "version": "4.2.4" } ], "sources": [ { "db": "BID", "id": "19829" }, { "db": "JVNDB", "id": "JVNDB-2006-003115" }, { "db": "CNNVD", "id": "CNNVD-200609-075" }, { "db": "NVD", "id": "CVE-2006-4587" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:vtiger:vtiger_crm", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2006-003115" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Ivan Markovic is credited with the discovery of these vulnerabilities.", "sources": [ { "db": "BID", "id": "19829" }, { "db": "CNNVD", "id": "CNNVD-200609-075" } ], "trust": 0.9 }, "cve": "CVE-2006-4587", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2006-4587", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-20695", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2006-4587", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2006-4587", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-200609-075", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-20695", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-20695" }, { "db": "JVNDB", "id": "JVNDB-2006-003115" }, { "db": "CNNVD", "id": "CNNVD-200609-075" }, { "db": "NVD", "id": "CVE-2006-4587" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple cross-site scripting (XSS) vulnerabilities in vtiger CRM 4.2.4, and possibly earlier, allow remote attackers to inject arbitrary web script or HTML via the (1) description parameter in unspecified modules or the (2) solution parameter in the HelpDesk module. vtiger CRM Contains a cross-site scripting vulnerability.By any third party, via the following parameters Web Script or HTML May be inserted. (1) Unspecified module description Parameters (2) HelpDesk Module solution Parameters. The vtiger CRM is prone to HTML-injection and access-control-bypass vulnerabilities because the application fails to properly sanitize user-supplied input and effectively control access to administrative modules. \nVersion 4.2.4 of vtiger CRM is reportedly affected; previous versions may be vulnerable as well. \n\n----------------------------------------------------------------------\n\nWant to work within IT-Security?\n\nSecunia is expanding its team of highly skilled security experts. \nWe will help with relocation and obtaining a work permit. \n\nCurrently the following type of positions are available:\nhttp://secunia.com/quality_assurance_analyst/\nhttp://secunia.com/web_application_security_specialist/ \nhttp://secunia.com/hardcore_disassembler_and_reverse_engineer/\n\n----------------------------------------------------------------------\n\nTITLE:\nvtiger CRM Script Insertion and Administrative Modules Access\n\nSECUNIA ADVISORY ID:\nSA21728\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/21728/\n\nCRITICAL:\nModerately critical\n\nIMPACT:\nSecurity Bypass, Cross Site Scripting\n\nWHERE:\n\u003eFrom remote\n\nSOFTWARE:\nvtiger CRM 4.x\nhttp://secunia.com/product/6211/\n\nDESCRIPTION:\nIvan Markovic has discovered some vulnerabilities in vtiger CRM,\nwhich can be exploited by malicious people to conduct script\ninsertion attacks and bypass certain security restrictions. \n\n1) Input passed to the \"description\" field in various modules when\ne.g. creating a contact and the \"solution\" field when an\nadministrator modifies the solution in the HelpDesk modules isn\u0027t\nproperly sanitised before being used. This can be exploited to inject\narbitrary HTML and script code, which will be executed in a user\u0027s\nbrowser session in context of an affected site when the malicious\nuser data is viewed. \n\n2) An error in the access control verification can be exploited by a\nnormal user to access administrative modules (e.g. the settings\nsection) by accessing certain URLs directly. \n\nThe vulnerabilities have been confirmed in version 4.2.4. \n\nUse another product. \n\nPROVIDED AND/OR DISCOVERED BY:\nIvan Markovic\n\nORIGINAL ADVISORY:\nhttp://www.security-net.biz/adv/D3906a.txt\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2006-4587" }, { "db": "JVNDB", "id": "JVNDB-2006-003115" }, { "db": "BID", "id": "19829" }, { "db": "VULHUB", "id": "VHN-20695" }, { "db": "PACKETSTORM", "id": "49637" } ], "trust": 2.07 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2006-4587", "trust": 2.5 }, { "db": "BID", "id": "19829", "trust": 2.0 }, { "db": "SECUNIA", "id": "21728", "trust": 1.8 }, { "db": "VUPEN", "id": "ADV-2006-3444", "trust": 1.7 }, { "db": "OSVDB", "id": "28461", "trust": 1.7 }, { "db": "OSVDB", "id": "28460", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2006-003115", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200609-075", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-20695", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "49637", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-20695" }, { "db": "BID", "id": "19829" }, { "db": "JVNDB", "id": "JVNDB-2006-003115" }, { "db": "PACKETSTORM", "id": "49637" }, { "db": "CNNVD", "id": "CNNVD-200609-075" }, { "db": "NVD", "id": "CVE-2006-4587" } ] }, "id": "VAR-200609-0101", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-20695" } ], "trust": 0.62916664 }, "last_update_date": "2024-11-23T22:24:23.549000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "vtiger CRM", "trust": 0.8, "url": "https://www.vtiger.com/crm/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2006-003115" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2006-4587" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "http://www.security-net.biz/adv/d3906a.txt" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/19829" }, { "trust": 1.7, "url": "http://www.osvdb.org/28460" }, { "trust": 1.7, "url": "http://www.osvdb.org/28461" }, { "trust": 1.7, "url": "http://secunia.com/advisories/21728" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2006/3444" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-4587" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2006-4587" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2006/3444" }, { "trust": 0.3, "url": "http://www.vtiger.com/" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/product/6211/" }, { "trust": 0.1, "url": "http://secunia.com/quality_assurance_analyst/" }, { "trust": 0.1, "url": "http://secunia.com/hardcore_disassembler_and_reverse_engineer/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/advisories/21728/" }, { "trust": 0.1, "url": "http://secunia.com/web_application_security_specialist/" }, { "trust": 0.1, "url": "http://secunia.com/about_secunia_advisories/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-20695" }, { "db": "BID", "id": "19829" }, { "db": "JVNDB", "id": "JVNDB-2006-003115" }, { "db": "PACKETSTORM", "id": "49637" }, { "db": "CNNVD", "id": "CNNVD-200609-075" }, { "db": "NVD", "id": "CVE-2006-4587" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-20695" }, { "db": "BID", "id": "19829" }, { "db": "JVNDB", "id": "JVNDB-2006-003115" }, { "db": "PACKETSTORM", "id": "49637" }, { "db": "CNNVD", "id": "CNNVD-200609-075" }, { "db": "NVD", "id": "CVE-2006-4587" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2006-09-06T00:00:00", "db": "VULHUB", "id": "VHN-20695" }, { "date": "2006-09-04T00:00:00", "db": "BID", "id": "19829" }, { "date": "2012-12-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2006-003115" }, { "date": "2006-09-06T06:32:48", "db": "PACKETSTORM", "id": "49637" }, { "date": "2006-09-06T00:00:00", "db": "CNNVD", "id": "CNNVD-200609-075" }, { "date": "2006-09-06T22:04:00", "db": "NVD", "id": "CVE-2006-4587" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-03-08T00:00:00", "db": "VULHUB", "id": "VHN-20695" }, { "date": "2006-09-06T20:23:00", "db": "BID", "id": "19829" }, { "date": "2012-12-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2006-003115" }, { "date": "2006-09-15T00:00:00", "db": "CNNVD", "id": "CNNVD-200609-075" }, { "date": "2024-11-21T00:16:18.937000", "db": "NVD", "id": "CVE-2006-4587" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200609-075" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "vtiger CRM Vulnerable to cross-site scripting", "sources": [ { "db": "JVNDB", "id": "JVNDB-2006-003115" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "XSS", "sources": [ { "db": "CNNVD", "id": "CNNVD-200609-075" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.