{"vuid":"VU#693036","idnumber":"693036","name":"Datalex airline booking software allowed authorization bypass for arbitrary users","keywords":["datalex","information disclosure","authorization bypass","CWE-639"],"overview":"Datalex provides a suite of software offerings for the airline industry which supports a customizable flight browsing, booking, payment, and analytics. The Datalex airline booking software contained an error in its error handling routines which allows authorization bypass and loss of confidentiality for arbitrary users.","clean_desc":"CWE-639: Authorization Bypass Through User-Controlled Key - CVE-2015-2858 By modifying HTTP POST parameters, an attacker may cause the Datalex application to return null values when querying data from the database. The application error handling enters a failed state due to the null value, allowing an attacker to hijack an account of choice through modification of the profileId parameter via a POST action to ValidateFormAction.do and ProfileConfirmEditAddressAction.do.","impact":"This vulnerability may have resulted in complete loss of confidentiality of all user data, as well as allow unauthenticated remote users the ability to modify arbitrary user data. The full impact may depend on server settings, which may vary between individual instances of the Datalex software suite.","resolution":"Updated applied already, no action required Datalex has confirmed this issue and has worked with all affected airlines to update their software. According to Datalex, all affected airlines have deployed the update as of September 3rd, 2015.","workarounds":"","sysaffected":"","thanks":"Thanks to the reporter who wishes to remain anonymous. Thanks to Datalex for working quickly with us and affected vendors to address the issue.","author":"This document was written by Garret Wassermann.","public":["h","t","t","p",":","/","/","c","w","e",".","m","i","t","r","e",".","o","r","g","/","d","a","t","a","/","d","e","f","i","n","i","t","i","o","n","s","/","6","3","9",".","h","t","m","l"],"cveids":["CVE-2015-2858"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2014-10-30T17:56:11Z","publicdate":"2015-09-30T00:00:00Z","datefirstpublished":"2015-09-30T22:25:15Z","dateupdated":"2015-09-30T22:25:15Z","revision":61,"vrda_d1_directreport":"1","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"N","cvss_accesscomplexity":"L","cvss_authentication":null,"cvss_confidentialityimpact":"C","cvss_integrityimpact":"N","cvss_availabilityimpact":"N","cvss_exploitablity":null,"cvss_remediationlevel":"OF","cvss_reportconfidence":"C","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"ND","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"7.8","cvss_basevector":"AV:N/AC:L/Au:N/C:C/I:N/A:N","cvss_temporalscore":"6.4","cvss_environmentalscore":"6.43545140112","cvss_environmentalvector":"CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}