{"vuid":"VU#273502","idnumber":"273502","name":"EasyVista single sign-on authentication bypass vulnerability","keywords":["EasyVista","Authentication Bypass"],"overview":"EasyVista contains an authentication bypass vulnerability in the EasyVista single sign-on feature.","clean_desc":"EasyVista contains an authentication bypass vulnerability in the EasyVista single sign-on feature that does not use encoded values. If an attacker can obtain the login names for any users with access to the application, then the attacker may be able to bypass authentication using a specifically crafted URL. An example URL is below: hxxp://servername/index.php?url_account=account_number&SSPI_HEADER=windows_domain\\username","impact":"If an attacker can obtain the login name of an application administrator, they may be able to perform any function an administrator can. The application contains an inventory database with sensitive information that would be useful to an attacker to expand their attack to the rest of the network.","resolution":"Apply an Update\nVersion 2010.1.1.89 has been released to address this vulnerability. Users can download the update from the EasyVista support site.","workarounds":"","sysaffected":"","thanks":"Thanks to ar1vr for reporting this vulnerability.","author":"This document was written by Jared Allar.","public":["h","t","t","p","s",":","/","/","s","u","p","p","o","r","t",".","e","a","s","y","v","i","s","t","a",".","c","o","m","/"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2012-01-04T12:54:28Z","publicdate":"2012-02-21T00:00:00Z","datefirstpublished":"2012-02-21T14:04:23Z","dateupdated":"2012-07-23T20:48:41Z","revision":24,"vrda_d1_directreport":"1","vrda_d1_population":"2","vrda_d1_impact":"3","cam_widelyknown":"12","cam_exploitation":"7","cam_internetinfrastructure":"7","cam_population":"10","cam_impact":"20","cam_easeofexploitation":"18","cam_attackeraccessrequired":"10","cam_scorecurrent":"17.55","cam_scorecurrentwidelyknown":"22.95","cam_scorecurrentwidelyknownexploited":"31.725","ipprotocol":"","cvss_accessvector":"N","cvss_accesscomplexity":"--","cvss_authentication":null,"cvss_confidentialityimpact":"C","cvss_integrityimpact":"C","cvss_availabilityimpact":"C","cvss_exploitablity":null,"cvss_remediationlevel":"OF","cvss_reportconfidence":"C","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"L","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"5.3","cvss_basevector":"AV:N/AC:--/Au:S/C:C/I:C/A:C","cvss_temporalscore":"4.6","cvss_environmentalscore":"1.2","cvss_environmentalvector":"CDP:ND/TD:L/CR:ND/IR:ND/AR:ND","metric":17.55,"vulnote":null}