what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

OrangeHRM 2.5.0.4 Cross Site Request Forgery / Cross Site Scripting / SQL Injection

OrangeHRM 2.5.0.4 Cross Site Request Forgery / Cross Site Scripting / SQL Injection
Posted May 10, 2010
Authored by Laszlo Klock, Tamas Czigany

OrangeHRM version 2.5.0.4 suffers from php code injection, cross site request forgery, cross site scripting and remote SQL injection vulnerabilities.

tags | advisory, remote, php, vulnerability, xss, sql injection, csrf
SHA-256 | ff47cc81bc380e6b7df1cddb5ba45a72534f65bc141e04718067b6e3c0fdada2

OrangeHRM 2.5.0.4 Cross Site Request Forgery / Cross Site Scripting / SQL Injection

Change Mirror Download
Vulnerability Report

1. Affected software
OrangeHRM 2.5.0.4
Prior versions may also be affected.
"OrangeHRM is an Open Source HRM system. It provides an ideal solution
for small and medium sized enterprises looking for an inexpensive way to
effectively manage and develop their human resources."
Product link: http://www.orangehrm.com/

2. Vulnerability Information
Class: Cross site scripting, SQL injection, PHP code injection, Cross-site
request forgery
Impact: Session hijacking, unauthorized data access, privilege escalation,
user-assisted arbitrary command execution
Rating: Less critical
Remotely Exploitable: Yes
Locally Exploitable: No


3. Description of Vulnerability
3.1.1. Stored XSS in ESS (Employee Self-Service)
In ESS module, user inputs are not sanitized properly, leading to XSS
vulnerability.
Exploiting this vulnerability would allow a malicious ESS user to gain
administrative privileges.


3.1.2. Stored XSS in the public-accessible jobs.php
module
In the recruitment module, user inputs are not sanitized properly,
leading to
XSS vulnerability.
Exploiting this vulnerability would allow an unauthenticated attacker to
gain
user or administrator privileges.

3.1.3. Reflected XSS
Some of the AJAX responses are not sanitized, leading to reflected XSS
vulnerability.

3.1.4. SQL injection
There are several places in the software where authenticated ESS users
can perform SQL injection attacks.
Successful exploitation of this vulnerability can lead to unauthorized
access
to sensitive data, or arbitrary code execution.

3.1.5. CSRF and PHP code injection
There are no security measures implemented in the software against CSRF
attacks. If a remote attacker can trick an administrator to visit a
malicious
site, the attacker can perform privileged operations, or exploit PHP code
injection vulnerability that can be found in the mail administration module.
Successful exploitation of these vulnerabilities can lead to arbitrary code
execution.

3.1.6. Authorization vulnerabilities
The Timesheet, Attendance, HSP, Recruitment, and Leave modules
contains bugs in the authorization code, that may make possible to
authenticated ESS users to access sensitive information, or perform
privileged operations.

4. Solution
We are not aware of any official fixes.

5. Workaround
Workarounds for some of these vulnerabilities can be implemented through
a Web Application Firewall, for example ModSecurity™ with the Core Rule
Set (CRS).
When using ModSecurity™: make sure you have enabled XSS and SQL
injection protection rules, and SecRequestBodyAccess is set (it is off by
default). CSRF protection can be implemented as described here:
http://knol.google.com/k/preventing-cross-site-request-forgeries-csrf-usingmodsecurity
.
One should consider revoking write access on lib/confs/mailConf.php from
the apache user (after doing so, OrangeHRM mail configurations can not be
modified from admin menu).
The session encryption features of suhosin PHP extension can make
session hijacking attacks harder as well.


6. Timeline
06/04/2010 – Vulnerabilities discovered
09/04/2010 – First attempt to contact vendor
19/04/2010 – Second attempt to contact vendor
10/05/2010 – Public disclosure

7. Credits
These vulnerabilities were discovered by Tamás Czigány and Laszlo Klock.

8. About us
SecurityAngel is the vulnerability research lab of kancellar.hu.
kancellar.hu is Hungary’s market leading information security private
limited company. The company offers full scope information security
services to its customers, performs audits, delivers end-to-end security
systems, tools, and solutions. Since its foundation in 2002, its revenues
have increased by more than tenfold. According to the survey conducted by
Deloitte, kancellar.hu was one of the 50 most dynamically developing
Central European companies for two years in a row in 2008 and 2009, and
one of the 500 most quickly growing companies in the EMEA region.

9. Legal notices
Disclaimer: The information in the advisory is believed to be accurate
at the
time of publishing based on currently available information. Use of the
information constitutes acceptance for use in an AS IS condition. There
are no warranties with regard to this information. Neither the author
nor the
publisher accepts any liability for any direct, indirect, or
consequential loss
or damage arising from use of, or reliance on, this information.
The product names used in this document are for identification purposes
only. All trademarks and registered trademarks are the property of their
respective owners.

Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close