Secunia Security Advisory - Some vulnerabilities have been discovered in LetoDMS, which can be exploited by malicious users and malicious people to disclose sensitive information and by malicious people to conduct cross-site request forgery attacks.
4c7dd7a90d28d1a46f84eb0e07ce60d4bb526597c17fd02f5616a3fd5fe702ff
----------------------------------------------------------------------
Secunia integrated with Microsoft WSUS
http://secunia.com/blog/71/
----------------------------------------------------------------------
TITLE:
LetoDMS Local File Inclusion and Cross-Site Request Forgery
Vulnerabilities
SECUNIA ADVISORY ID:
SA38237
VERIFY ADVISORY:
http://secunia.com/advisories/38237/
DESCRIPTION:
Some vulnerabilities have been discovered in LetoDMS, which can be
exploited by malicious users and malicious people to disclose
sensitive information and by malicious people to conduct cross-site
request forgery attacks.
1) Input passed to the "lang" parameter in op/op.Login.php is not
properly verified before being used to include files. This can be
exploited to include arbitrary files from local resources via
directory traversal attacks and URL-encoded NULL bytes.
2) The application allows users to perform certain actions via HTTP
requests without performing any validity checks to verify the
requests. This can be exploited to e.g. change user details, delete
users, delete documents, delete folders, add arbitrary categories,
add arbitrary groups, change folder access permissions, change notify
list for folders, or move folders by tricking a logged in user into
visiting a malicious web site.
The vulnerabilities are confirmed in version 1.7.2. Other versions
may also be affected.
SOLUTION:
Edit the source code to ensure that input is properly verified. Do
not browse untrusted websites or follow untrusted links while logged
in to the application.
PROVIDED AND/OR DISCOVERED BY:
D. Fabian and L. Weichselbaum, SEC Consult
ORIGINAL ADVISORY:
https://www.sec-consult.com/files/20100115-0_mydms_file_inclusion.txt
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------