Sense of Security is one of Australia’s most trusted providers of cyber resilience, information security and risk management services.

Latest announcements
© Copyright Sense of Security

Security Advisory – SOS-15-003 – ClickSoftware ClickMobile Multiple Security Vulnerabilities

Release Date: 14-Apr-2015

Last Update:

Vendor Notification Date: 24-Jun-2014

Product: ClickSoftware ClickMobile Mobile Application

Platform: iOS

Affected versions: ClickMobile 8.1.9 (v17) and lower

Severity Rating: High

Impact: Privilege escalation
Security bypass
Manipulation of data

Attack Vector: Remote with authentication

Solution Status: Vendor patch

CVE reference:


ClickSoftware ClickMobile is a mobile application which provides workforce management functionality to field engineers. The ClickMobile application has vertical and horizontal privilege escalation vulnerabilities which allow mobile users to impersonate other users by only knowing their username (without their password). The ClickMobile web service has no access control after the initial NTLM authentication exchange. Attackers can use this vulnerability to impersonate a privileged user to obtain unauthorised access to SAP resources or to manipulate SAP data which requires higher privileges.

ClickMobile also allows verifying the file extension, size, and amount being uploaded from the client side. Once this verification is performed on the client side and passed, there is no ability to control the insertion of files into the middleTier DB. Wherebyallowing the upload of insecure files.

Please refer to the PDF version of this advisory for proof of concept code examples.


Install the 8.1.10 P2 Security Enhancement msi on the ClickMobile MiddleTier server.

Make the below configuration changes to fix the insecure file upload vulnerability:
1. On the MiddleTier IIS, open the Web.Config file.
2. Under the “appSettings” add the following 2 keys:
<add key=”FileUploadPreprocessorDLLPath”
(This is the DLL name which should be located under the bin folder of the
ClickMobileWeb site)
<add key=”FileUploadPreprocessorProgID”
(This is the <namespace>.<class name> of the code.)
3. Save the file.
4. Stop/Start the IIS process (W3WP).

Make the below configuration changes to fix privilege escalation and unauthorised access vulnerabilities:
1. On the MiddleTier IIS, open the Web.Config file.
2. Under “appSettings” add the following key:
<add key=”ValidateUserInRequests” value=”true”/>
3. Save the file.
4. Stop/Start the IIS process (W3WP).

Discovered By

Fatih Ozavci from Sense of Security Labs.

Our expert consultants are here to help you. For all your Cyber Security needs please contact us today.

No Comments

Sorry, the comment form is closed at this time.