Vulnerabilities > CVE-2019-6716 - Authorization Bypass Through User-Controlled Key vulnerability in Logonbox Nervepoint Access Manager 1.2/1.3/1.4

047910
CVSS 9.4 - CRITICAL
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
LOW
Integrity impact
HIGH
Availability impact
HIGH
network
low complexity
logonbox
CWE-639
critical
exploit available

Summary

An unauthenticated Insecure Direct Object Reference (IDOR) in Wicket Core in LogonBox Nervepoint Access Manager 2013 through 2017 allows a remote attacker to enumerate internal Active Directory usernames and group names, and alter back-end server jobs (backup and synchronization jobs), which could allow for the possibility of a Denial of Service attack via a modified jobId parameter in a runJob.html GET request.

Exploit-Db

fileexploits/multiple/webapps/46254.txt
idEDB-ID:46254
last seen2019-01-28
modified2019-01-28
platformmultiple
port
published2019-01-28
reporterExploit-DB
sourcehttps://www.exploit-db.com/download/46254
titleLogonBox Limited / Hypersocket Nervepoint Access Manager - Unauthenticated Insecure Direct Object Reference
typewebapps

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/151373/logonbox-insecure.txt
idPACKETSTORM:151373
last seen2019-01-29
published2019-01-29
reporter0v3rride
sourcehttps://packetstormsecurity.com/files/151373/LongBox-Limited-Access-Manager-Insecure-Direct-Object-Reference.html
titleLongBox Limited Access Manager Insecure Direct Object Reference