{"vuid":"VU#595884","idnumber":"595884","name":"Aptexx Resident Anywhere exposes sensitive account information","keywords":["Aptexx","CWE-288","authentication","PII"],"overview":"Aptexx Resident Anywhere does not require authentication to view and modify sensitive information contained in direct account and payment URLs, which can be leveraged to bypass authentication and access user accounts.","clean_desc":"CWE-288: Authentication Bypass Using an Alternate Path or Channel - CVE-2014-4882 Aptexx Resident Anywhere, an online payment processing and maintenance request handling service for property managers, does not require authentication to view and modify the account information of its users. Anyone with knowledge of a direct account URL or the ability to guess one can gain account access, bypassing authentication. Account access enables a user to view and modify account data and to submit payments and requests.","impact":"A remote, unauthenticated attacker with access to a specific URL can acquire the last four digits of any stored payment account numbers, as well as the name, address, email address, phone number, and payment history of the victim user. The attacker can modify or remove account information, set a new password, and submit fraudulent maintenance requests and payments using stored payment methods.","resolution":"The CERT/CC is currently unaware of a practical solution to this problem. Until this vulnerability is addressed, Aptexx users should consider the following workaround:","workarounds":"Do not store sensitive information Do not store sensitive information, specifically payment (credit/debit card or bank account) information with Aptexx until this vulnerability has been resolved. Current users should consider removing sensitive information from their Aptexx accounts.","sysaffected":"","thanks":"Thanks to Claus Jensen for reporting this vulnerability.","author":"This document was written by Todd Lewellen and Joel Land.","public":["https://cwe.mitre.org/data/definitions/288.html","http://www.aptexx.com/"],"cveids":["CVE-2014-4882"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2014-08-26T18:00:55Z","publicdate":"2015-06-08T00:00:00Z","datefirstpublished":"2015-06-08T16:00:46Z","dateupdated":"2015-07-01T13:09:19Z","revision":36,"vrda_d1_directreport":"1","vrda_d1_population":"2","vrda_d1_impact":"3","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"N","cvss_accesscomplexity":"L","cvss_authentication":null,"cvss_confidentialityimpact":"P","cvss_integrityimpact":"P","cvss_availabilityimpact":"P","cvss_exploitablity":null,"cvss_remediationlevel":"U","cvss_reportconfidence":"C","cvss_collateraldamagepotential":"MH","cvss_targetdistribution":"L","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"7.5","cvss_basevector":"AV:N/AC:L/Au:N/C:P/I:P/A:P","cvss_temporalscore":"6.8","cvss_environmentalscore":"2.01042897752125","cvss_environmentalvector":"CDP:MH/TD:L/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}