SSO Authentication Bypass and Website Takeover in DOKEOS
Advisory ID: | HTB23289 |
Product: | DOKEOS |
Vendor: | DOKEOS |
Vulnerable Versions: | ce30 and probably prior |
Tested Version: | ce30 |
Advisory Publication: | January 7, 2016 [without technical details] |
Vendor Notification: | January 7, 2016 |
Public Disclosure: | February 17, 2016 |
Vulnerability Type: | Improper Authentication [CWE-287] |
CVE Reference: | Pending |
Risk Level: | High |
CVSSv2 Base Score: | 7.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L] |
Discovered and Provided: | High-Tech Bridge Security Research Lab |
Advisory Details: | |
High-Tech Bridge Security Research Lab discovered a high-risk vulnerability in a popular e-learning software DOKEOS. A remote unauthenticated attacker can bypass authentication process and login to the vulnerable website with an arbitrary account (including administrator's one). Successful exploitation requires Single Sign-On (SSO) authentication to be enabled. | |
Solution: | |
Disclosure timeline: 2016-01-07 Vendor notified via contact form, no reply. 2016-01-13 Vendor notified via contact form, emails and twitter, no reply. 2016-01-20 Vendor notified via contact form and emails, no reply. 2016-01-27 Fix Requested via contact form and emails, no reply. 2016-02-03 Fix Requested via contact form and emails, no reply. 2016-02-17 Public disclosure. Currently we are not aware of any official solution for this vulnerability. | |
References: | |
[1] High-Tech Bridge Advisory HTB23289 - https://www.immuniweb.com/advisory/HTB23289 - SSO Auth Bypass and Website Takeover in DOKEOS [2] DOKEOS - http://www.dokeos.com/ - E-LEARNING suite and LMS for growing companies [3] Common Weakness Enumeration (CWE) - http://cwe.mitre.org - targeted to developers and security practitioners, CWE is a formal list of software weakness types. [4] ImmuniWeb® - Leveraging the power of machine-learning and genius of human brain to deliver the most advanced web application security and penetration testing. [5] ImmuniWeb® SSLScan - Test your servers for security and compliance with PCI DSS, HIPAA and NIST. | |
Please feel free to send us any additional information related to this Advisory, such as vulnerable versions, additional exploitation details and conditions, patches and other relevant details.