Vulnerability Note VU#800227

OneOrZero AIMS authentication bypass and SQLi vulnerabilities

Original Release date: 13 Oct 2011 | Last revised: 13 Oct 2011


OneOrZero Action & Information Management System (AIMS) is vulnerable to an authentication bypass and SQL injection.


According to the vendor's website:

"OneOrZero AIMS is a powerful enterprise ready suite that includes a help desk, knowledge base, time manager and reporting system supported by a highly configurable and extensible Action & Information Management System that allows you to 'build your own system' on the fly."

AIMS is susceptible to an authentication bypass. An attacker can generate a session cookie for $_COOKIE['oozimsrememberme'] and log in as an administrator without providing a password.

AIMS is also susceptible to SQL injection. On line 136 of lib\ooz_access.php the $cookieName variable that originates from an attacker controllable cookie is passed to a SQL statement without any filtering:

    $sql = "SELECT * FROM " . OOZ_SET_TABLE_PREFIX . "users WHERE user_name = '" . $cookieName . "'";
    $userResult = DB::query($sql, DSN, OOZ_SET_SHOW_SQL);


An unauthenticated remote attacker may be able to bypass authentication or leak database information.


We are currently unaware of a practical solution to this problem.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
OneOrZeroAffected-12 Oct 2011
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



Thanks to Yuri Goltsev of Positive Technologies for reporting this vulnerability.

This document was written by Jared Allar.

Other Information

  • CVE IDs: Unknown
  • Date Public: 12 Oct 2011
  • Date First Published: 13 Oct 2011
  • Date Last Updated: 13 Oct 2011
  • Severity Metric: 0.07
  • Document Revision: 7


If you have feedback, comments, or additional information about this vulnerability, please send us email.