search menu icon-carat-right cmu-wordmark

CERT Coordination Center

NotifyLink web client fails to adequately restrict access to administrative functions

Vulnerability Note VU#131828

Original Release Date: 2005-03-17 | Last Revised: 2005-04-20


The NotifyLink web interface contains a vulnerability that allows authenticated normal users to access functions that have been disabled by an administrator.


Notify Technology NotifyLink Enterprise Server allows users to synchronize e-mail between a PDA and a mail server. The application consists of a PDA-specific client and the NotifyLink server, which acts as a proxy between the client and the mail server(s) the user wants to check. For each e-mail account to be monitored, the user provides mail server credentials that are stored on the NotifyLink server and used to periodically check for mail. When new mail arrives, the NotifyLink server stores a reference to the message ID. Depending on the configuration, the message is either sent to the device via SMS ("Push" mode), or the device periodically checks a link on the NotifyLink web server to retrieve the message ("Poll" mode). The product supports multiple PDA platforms and multiple e-mail servers, including IMAP, POP, Microsoft Exchange, and Novell GroupWise.

The NotifyLink web interface allows administrative users to restrict ordinary users from accessing certain functions. When such a restriction is in place, the button for the function is disabled in the user's presentation of the interface. An attacker can bypass this restriction by altering the URL they present to the server and accessing the restricted functionality directly.


This vulnerability allows authenticated normal users to access functions that have been disabled by an administrator.


Upgrade or Patch
This issue is resolved in NotifyLink 3.0. Starting with this version, authentication of the user is performed on each feature page.

Vendor Information


Notify Technology Affected

Notified:  March 29, 2004 Updated: May 04, 2004



Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.


The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

CVSS Metrics

Group Score Vector



We thank the NOAA NCIRT Lab for their discovery and analysis of this vulnerability.

This document was written by Jeffrey P Lanza and Will Dormann . It is based on analysis provided by the NOAA NCIRT Lab.

Other Information

CVE IDs: CVE-2005-0811
Severity Metric: 0.46
Date Public: 2005-03-17
Date First Published: 2005-03-17
Date Last Updated: 2005-04-20 21:27 UTC
Document Revision: 34

Sponsored by CISA.