发布时间 :2002-06-18 00:00:00
修订时间 :2008-09-05 16:28:24

[原文]WorkforceROI Xpede 4.1 allows remote attackers to read user timesheets by modifying the TSN ID parameter to the ts_app_process.asp script, which is easily guessable because it is incremented by 1 for each new timesheet.

[CNNVD]WorkforceROI XPede任意时间表泄露漏洞(CNNVD-200206-017)

        XPede是一款基于WEB的项目审核软件,可运行在Microsoft Windows操作系统下。
        此问题存在于XPede 4.1版本中,其他版本也可能存在此漏洞。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(VENDOR_ADVISORY)  BUGTRAQ  20020419 Xpede many vulnerabilities
(VENDOR_ADVISORY)  XF  xpede-timesheet-disclosure(8907)

- 漏洞信息

WorkforceROI XPede任意时间表泄露漏洞
中危 访问验证错误
2002-06-18 00:00:00 2005-10-20 00:00:00
        XPede是一款基于WEB的项目审核软件,可运行在Microsoft Windows操作系统下。
        此问题存在于XPede 4.1版本中,其他版本也可能存在此漏洞。

- 公告与补丁

        * 暂时没有好的临时解决方法。

- 漏洞信息

WorkforceROI Xpede ts_app_process.asp Predictable TSN ID Arbitrary Worksheet Access
Remote / Network Access

- 漏洞描述

Unknown or Incomplete

- 时间线

2002-04-19 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

WorkforceROI XPede Arbitrary Time Sheet Disclosure Vulnerabiltiy
Access Validation Error 4556
Yes No
2002-04-19 12:00:00 2009-07-11 12:46:00
Discovered by Cerberus Vulgaris <>.

- 受影响的程序版本

WorkforceROI Xpede 4.1

- 漏洞讨论

XPede is web-based project accounting software. It is available for Microsoft Windows operating systems.

An issue has been reported in Xpede, which could allow a remote user to access the time sheets of other users. The vulnerability is in the 'ets_app_process.asp' script and is due to a lack of adequate authorization checks.

This issue was reported for XPede 4.1. Other versions may also be affected.

- 漏洞利用

No exploit code is required.

- 解决方案

Currently the SecurityFocus staff are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: <>.

- 相关参考