PT-2011-20: Authorization bypass vulnerability in OneOrZero AIMS
Version: 2.7.0 and earlier (possibly)
Severity level: High
Impact: Authorization bypass
Access Vector: Network exploitable
Base Score: 7.5
CVE: not assigned
OneOrZero AIMS is a powerful enterprise ready suite that includes a help desk, knowledge base, time manager and reporting system supported by a highly configurable and extensible Action & Information Management System that allows you to 'build your own system' on the fly.
Positive Research Center has discovered authorization bypass vulnerability in OneOrZero AIMS.
Vulnerability exists due incorrect logic of authorization using $_COOKIE variables - predictable session value, stored in $_COOKIE['oozimsrememberme'] variable.
Attacker, have valid username which registered in system, can generate session and bypass authorization.
How to fix
Review algorithm of authorization with $_COOKIE['oozimsrememberme'] variable and add some logic to associate this variable with password.
08.07.2011 - Vendor is notified
23.08.2011 - Vulnerability details were sent to CERT
19.10.2011 - Public disclosure
The vulnerability was detected by Yuri Goltsev, Positive Research Center (Positive Technologies Company)
Reports on the vulnerabilities previously discovered by Positive Research: