================================= Vulnerability ID: HTB22918 Reference: http://www.htbridge.ch/advisory/path_disclosure_in_phpcollab.html Product: phpCollab Vendor: phpCollab Team ( http://www.php-collab.org/ ) Vulnerable Version: 2.5 and probably prior versions Vendor Notification: 24 March 2011 Vulnerability Type: Path disclosure Risk level: Low Credit: High-Tech Bridge SA - Ethical Hacking & Penetration Testing (http://www.htbridge.ch/) Vulnerability Details: The vulnerability exists due to failure in the "projects_site/login.php", "general/error.php", "includes/vcard.class.php" scripts, it's possible to generate an error that will reveal the full path of the script. A remote user can determine the full path to the web root directory and other potentially sensitive information. The following PoC is available: http://host/projects_site/login.php http://host/general/error.php http://host/includes/vcard.class.php ================================= Vulnerability ID: HTB22917 Reference: http://www.htbridge.ch/advisory/xss_vulnerabilities_in_phpcollab.html Product: phpCollab Vendor: phpCollab Team ( http://www.php-collab.org/ ) Vulnerable Version: 2.5 and probably prior versions Vendor Notification: 24 March 2011 Vulnerability Type: Stored XSS (Cross Site Scripting) Risk level: Medium Credit: High-Tech Bridge SA - Ethical Hacking & Penetration Testing (http://www.htbridge.ch/) Vulnerability Details: User can execute arbitrary JavaScript code within the vulnerable application. The vulnerability exists due to failure in the "newsdesk/editnews.php", "projects/editproject.php", "clients/editclient.php" scripts to properly sanitize user-supplied input in "links", "url_dev", "url" variables. Successful exploitation of this vulnerabilities could result in a compromise of the application, theft of cookie-based authentication credentials, disclosure or modification of sensitive data. An attacker can use browser to exploit this vulnerability. The following PoC is available: 1.
2.
3.
================================= Vulnerability ID: HTB22916 Reference: http://www.htbridge.ch/advisory/xsrf_csrf_in_phpcollab.html Product: phpCollab Vendor: phpCollab Team ( http://www.php-collab.org/ ) Vulnerable Version: 2.5 and probably prior versions Vendor Notification: 24 March 2011 Vulnerability Type: CSRF (Cross-Site Request Forgery) Risk level: Low Credit: High-Tech Bridge SA - Ethical Hacking & Penetration Testing (http://www.htbridge.ch/) Vulnerability Details: The vulnerability exists due to failure in the "users/edituser.php" script to properly verify the source of HTTP request. Successful exploitation of this vulnerability could result in a compromise of the application, theft of cookie-based authentication credentials, disclosure or modification of sensitive data. Attacker can use browser to exploit this vulnerability. The following PoC is available: