search menu icon-carat-right cmu-wordmark

CERT Coordination Center

ScrumWorks Pro privilege escalation vulnerability

Vulnerability Note VU#442595

Original Release Date: 2012-06-07 | Last Revised: 2012-06-07

Overview

ScrumWorks Pro versions prior to ScrumWorks Pro 6.0 contain a privilege escalation vulnerability.

Description

ScrumWorks Pro versions prior to ScrumWorks Pro 6.0 contain a privilege escalation vulnerability where a malicious user can escalate the privileges of their ScrumWorks Pro account by recompiling the desktop client. When exploited, a malicious user could grant themselves ScrumWorks Pro privileges and access information to which they would otherwise be unable to access.

Impact

A malicious user can escalate the privileges of their ScrumWorks Pro account by recompiling the desktop client.

Solution

Update

CollabNet has stated: CollabNet has addressed this problem in release 6.0 such that a modified client is no longer effective in escalating permissions. Note for all versions of ScrumWorks Pro, this security issue does not compromise the security of the underlying host operating system and that a modified client does not negate the need for a valid username and password. Further, all activities by modified clients are still logged in the server.log file.

Vendor Information

442595
 

CollabNet Affected

Notified:  February 16, 2012 Updated: May 31, 2012

Status

Affected

Vendor Statement

CollabNet has addressed this problem in release 6.0 such that a modified client is no longer effective in escalating permissions. Note for all versions of ScrumWorks Pro, this security issue does not compromise the security of the underlying host operating system and that a modified client does not negate the need for a valid username and password. Further, all activities by modified clients are still logged in the server.log file.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.


CVSS Metrics

Group Score Vector
Base 5.6 AV:N/AC:H/Au:S/C:C/I:P/A:N
Temporal 4.4 E:POC/RL:OF/RC:C
Environmental 1.2 CDP:L/TD:L/CR:ND/IR:ND/AR:ND

References

Acknowledgements

Thanks to Wolfgang Holoch and David Elze of Daimler TSS GmbH for reporting this vulnerability.

This document was written by Michael Orlando.

Other Information

CVE IDs: CVE-2012-2603
Date Public: 2012-06-04
Date First Published: 2012-06-07
Date Last Updated: 2012-06-07 11:16 UTC
Document Revision: 11

Sponsored by CISA.