Synopsis
CVE-2021-20111 - Stored Cross Site Scripting Vulnerability in tce_filemanager.php
A stored cross-site scripting vulnerability exists in TCExam <= 14.8.1. Valid files uploaded via tce_filemanager.php with a filename beggining with a period will be rendered as text/html. An attacker with access to tce_filemanager.php could upload a malicious javascript payload which would be triggered when another user views the file (either via tce_filemanager.php, other pages which allow the viewing of files, or via direct link).
CVE-2021-20112 - Stored Cross Site Scripting Vulnerability in tce_select_mediafile.php
A stored cross-site scripting vulnerability exists in TCExam <= 14.8.1. Valid files uploaded via tce_select_mediafile.php with a filename beggining with a period will be rendered as text/html. An attacker with access to tce_select_mediafile.php could upload a malicious javascript payload which would be triggered when another user views the file (either via tce_select_mediafile.php, other pages which allow the viewing of files, or via direct link).
CVE-2021-20113 - Unauthenticated User Enumeration
CVE-2021-20114 - Unauthenticated Access to Sensitive Objects via /cache/backup/
Among other things, these backup files contain usernames, password hashes and other user information that was supplied on signup.
CVE-2021-20115 - Stored Cross Site Scripting Vulnerability in tce_filemanager.php
CVE-2021-20116 - Stored Cross Site Scripting Vulnerability in tce_select_mediafile.php
Solution
All issues have been fixed as of TCExam 14.8.5
Additional References
https://github.com/tecnickcom/tcexam/commit/99ee2e02849c6285c5b9f18f31a1b5938d97191bhttps://github.com/tecnickcom/tcexam/commit/9dce209ebb74857a50df70b31338a7002588d400
https://github.com/tecnickcom/tcexam/commit/c51f9e8a8bf0759da1534978b15a56910c9ae942
https://github.com/tecnickcom/tcexam/commit/e96ea335d73bcf60968cd003332a039fed0b7515
https://github.com/tecnickcom/tcexam/commit/c481b2890fb0f3ed2d9ec387b7954dd40af9246e
Disclosure Timeline
All information within TRA advisories is provided “as is”, without warranty of any kind, including the implied warranties of merchantability and fitness for a particular purpose, and with no guarantee of completeness, accuracy, or timeliness. Individuals and organizations are responsible for assessing the impact of any actual or potential security vulnerability.
Tenable takes product security very seriously. If you believe you have found a vulnerability in one of our products, we ask that you please work with us to quickly resolve it in order to protect customers. Tenable believes in responding quickly to such reports, maintaining communication with researchers, and providing a solution in short order.
For more details on submitting vulnerability information, please see our Vulnerability Reporting Guidelines page.
If you have questions or corrections about this advisory, please email [email protected]