Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Multiple Vulnerabilities in TCExam

Critical

Synopsis

A researcher at Tenable discovered multiple vulnerabilities in TCExam 14.8.1.

CVE-2021-20111 - Stored Cross Site Scripting Vulnerability in tce_filemanager.php

CVSSv3 Base Score: 4.6
CVSSv3 Vector: AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
CWE: 79

A stored cross-site scripting vulnerability exists in TCExam <= 14.8.1. Valid files uploaded via tce_filemanager.php with a filename beggining with a period will be rendered as text/html. An attacker with access to tce_filemanager.php could upload a malicious javascript payload which would be triggered when another user views the file (either via tce_filemanager.php, other pages which allow the viewing of files, or via direct link).

CVE-2021-20112 - Stored Cross Site Scripting Vulnerability in tce_select_mediafile.php

CVSSv3 Base Score: 4.6
CVSSv3 Vector: AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
CWE: 79

A stored cross-site scripting vulnerability exists in TCExam <= 14.8.1. Valid files uploaded via tce_select_mediafile.php with a filename beggining with a period will be rendered as text/html. An attacker with access to tce_select_mediafile.php could upload a malicious javascript payload which would be triggered when another user views the file (either via tce_select_mediafile.php, other pages which allow the viewing of files, or via direct link).

CVE-2021-20113 - Unauthenticated User Enumeration

CVSSv3 Base Score: 5.3
CVSSv3 Vector: AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CWE-203
An exposure of sensitive information vulnerability exists in TCExam <= 14.8.1. If a password reset request was made for an email address that was not registered with a user then we would be presented with an ‘unknown email’ error. If an email is given that is registered with a user then this error will not appear. A malicious actor could abuse this to enumerate the email addresses of registered users.

CVE-2021-20114 - Unauthenticated Access to Sensitive Objects via /cache/backup/

CVSSv3 Base Score: 9.1
CVSSv3 Vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
CWE: 200
When installed following the default/recommended settings, TCExam <= 14.8.1 allowed unauthenticated users to access the /cache/backup/ directory, which included sensitive database backup files.

Among other things, these backup files contain usernames, password hashes and other user information that was supplied on signup.

CVE-2021-20115 - Stored Cross Site Scripting Vulnerability in tce_filemanager.php

CVSSv3 Base Score: 5.4
CVSSv3 Vector: AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
CWE: 79
 
A reflected cross-site scripting vulnerability exists in TCExam <= 14.8.3. The paths provided in the f, d, and dir parameters in tce_filemanager.php were not properly validated and could cause reflected XSS via the unsanitized output of the path suppliedAn attacker could craft a malicious link which, if triggered by an administrator, could result in the attacker hijacking the victim's session or performing actions on their behalf.

CVE-2021-20116 - Stored Cross Site Scripting Vulnerability in tce_select_mediafile.php

CVSSv3 Base Score: 5.4
CVSSv3 Vector: AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
CWE: 79
A reflected cross-site scripting vulnerability exists in TCExam <= 14.8.4. The paths provided in the f, d, and dir parameters in tce_select_mediafile.php were not properly validated and could cause reflected XSS via the unsanitized output of the path suppliedAn attacker could craft a malicious link which, if triggered by an administrator, could result in the attacker hijacking the victim's session or performing actions on their behalf.

Solution

All issues have been fixed as of TCExam 14.8.5

Disclosure Timeline

15 July 2021 - Vulnerabilities Discovered
19 July 2021 - Tecnick notified
20 July 2021 - Fixes pushed
21 July 2021 - Advisory published
22 July 2021 - Tenable asks if fixes are being prepare for the reflected XSS vulnerabilities
3 Aug 2021 - Tecnick having trouble reproducing, asks for clarification
4 Aug 2021 - Tenable provides clarification
4 Aug 2021 - Tecnick partially fixes issues in TCExam 14.8.4
4 Aug 2021 - Tenable informs Tecnick that the fixes need to be implemented in an additional file
5 Aug 2021 - Tecnick releases fix in 14.8.5. All vulnerabilities addressed

All information within TRA advisories is provided “as is”, without warranty of any kind, including the implied warranties of merchantability and fitness for a particular purpose, and with no guarantee of completeness, accuracy, or timeliness. Individuals and organizations are responsible for assessing the impact of any actual or potential security vulnerability.

Tenable takes product security very seriously. If you believe you have found a vulnerability in one of our products, we ask that you please work with us to quickly resolve it in order to protect customers. Tenable believes in responding quickly to such reports, maintaining communication with researchers, and providing a solution in short order.

For more details on submitting vulnerability information, please see our Vulnerability Reporting Guidelines page.

If you have questions or corrections about this advisory, please email [email protected]

Risk Information

Tenable Advisory ID: TRA-2021-32
Credit:
Derrie Sutton
CVSSv3 Base / Temporal Score:
9.1
CVSSv3 Vector:
AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Affected Products:
TCExam <= 14.8.4
Risk Factor:
Critical

Advisory Timeline

21 July 2021 - Advisory published
05 August 2021 - Advisory updated with additional vulnerabilities