-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Advisory ID: SYSS-2016-006
Product: sam*
Vendor: secova
Affected Version(s): 5.8.2 and below
Tested Version(s): 5.7.11
Vulnerability Type: Cross-Site Scripting (CWE-79)
Risk Level: Medium
Solution Status: Fixed
Vendor Notification: 2016-01-08
Solution Date: 2016-04-18
Public Disclosure: 2016-05-24
CVE Reference: Not assigned
Author of Advisory: Franz G. Jahn, SySS GmbH, https://www.syss.de/advisories/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Overview:
It was discovered that the sam* application allows the usage of HTML
code inside email messages.
The sam* application is described as follows [2]:
"sam* is an electronic documentation system and is used primarily in the
areas of health and safety, occupational safety, occupational health,
environmental protection, quality waste management and HR.
(Keyword: EHS Software)
All essential operational requirements for companies are ideally
satisfied with sam*. sam* dovetails the most important main and sub-
disciplines (ISO, OHSAS, knowledge logistics and legal compliance) with
one another."
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Vulnerability Details:
The sam* application contains a feature which allows to track accidents.
An accident log can be created inside the application, involved persons
can be informed via email.
Failing to properly sanitize user input, the application can be used to
send emails with arbitrary HTML content.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Proof of Concept (PoC):
1) Create a new accident entry with the following description:
test ItalicBold
2) Send a notification to an arbitrary mail address via sam*.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Solution:
Upgrade to version 5.8.3 or later
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Disclosure Timeline:
2015-12-22: Vulnerability discovered
2016-01-08: Vulnerability reported to vendor
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
References:
[1] SySS GmbH, SYSS-2016-006
https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2016-006.txt
[2] Vendor description of sam*
https://www.secova.de/en/home/what-is-sam/
[3] SySS GmbH, SySS Responsible Disclosure Policy
https://www.syss.de/en/news/responsible-disclosure-policy/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Credits:
Security vulnerability found by Franz G. Jahn of the SySS GmbH.
E-Mail: franz.jahn (at) syss.de
Public Key: https://www.syss.de/fileadmin/dokumente/Materialien/PGPKeys/Franz_Jahn.asc
Key ID: 0xD06A14DE
Key Fingerprint: 2D26 E435 DF7F 572D A0C9 1DE8 D5A6 1496 D06A 14DE
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Disclaimer:
The information provided in this security advisory is provided "as is"
and without warranty of any kind. Details of this security advisory may
be updated in order to provide as accurate information as possible. The
latest version of this security advisory is available on the SySS Web
site.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Copyright:
Creative Commons - Attribution (by) - Version 3.0
URL: http://creativecommons.org/licenses/by/3.0/deed.en
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=sLpx
-----END PGP SIGNATURE-----