PT-2011-20: Authorization bypass vulnerability in OneOrZero AIMS

Vulnerable software

OneOrZero AIMS
Version: 2.7.0 and earlier (possibly)

Application link:
http://www.oneorzero.com/

Severity level

Severity level: High
Impact: Authorization bypass
Access Vector: Network exploitable

CVSS v2:
Base Score: 7.5 
Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVE: not assigned

Software description

OneOrZero AIMS is a powerful enterprise ready suite that includes a help desk, knowledge base, time manager and reporting system supported by a highly configurable and extensible Action & Information Management System that allows you to 'build your own system' on the fly.

Vulnerability description

Positive Research Center has discovered authorization bypass vulnerability in OneOrZero AIMS.
Vulnerability exists due incorrect logic of authorization using $_COOKIE variables - predictable session value, stored in $_COOKIE['oozimsrememberme'] variable.
Attacker, have valid username which registered in system, can generate session and bypass authorization.

How to fix

Review algorithm of authorization with $_COOKIE['oozimsrememberme'] variable and add some logic to associate this variable with password.

Advisory status

08.07.2011 - Vendor is notified
23.08.2011 - Vulnerability details were sent to CERT
19.10.2011 - Public disclosure

Credits

The vulnerability was detected by Yuri Goltsev, Positive Research Center (Positive Technologies Company)

References

http://en.securitylab.ru/lab/PT-2011-20
http://www.kb.cert.org/vuls/id/800227

Reports on the vulnerabilities previously discovered by Positive Research:

http://www.ptsecurity.com/advisory1.aspx
http://en.securitylab.ru/lab/