Layton Helpbox version 4.4.0 suffers from login bypass vulnerabilities due to improper cookie design.
16ee66d4cbd6d224b10fa5f95bc298defb75ded84f60334c0975efd6f7d244e2
Layton Helpbox 4.4.0 Login Bypass Vulnerability by Joseph Sheridan
Summary
Layton Technologies Helpbox product version 4.4.0 is vulnerable to a login bypass vulnerability.
CVE number: CVE-2012-4974
Impact: High
Vendor homepage: http://www.laytontechnology.com
Vendor notified: 10/09/2012
Vendor response: This product has been replaced by 'ServiceDesk' but fixes may be available with valid support contracts.
Credit: Joseph Sheridan of ReactionIS
Affected Products
Helpbox 4.4.0
Details
The following cookies control the user's login session and can be trivially modified to login as admin or any other known username. The 'loggedinuserusergroup' can be set to 'administrator' to gain full privileges.
loggedinenduser, loggedinendusername, loggedinuserusergroup (administrator),
loggedinuser, loggedinusername
Impact
An attacker can login as any user he/she wishes and make arbitrary changes to the application data.
Solution
Layton advise upgrading to their newer 'ServiceDesk' product. However, if you have an active support contract, Layton may be able to provide fixes for you.
About ReactionIS
Reaction Information Security is a leading independent pen test consultancy specialising in delivering the highest quality security testing services including network pen testing and web application security testing. As a CESG CHECK Service Provider we are authorised to carry out penetration testing on classified government networks.