Multiple Security Misconfigurations and Customer Enumeration Exposure in Convercent Whistleblowing Platform (EQS Group)
好的,我现在需要帮用户总结这篇文章的内容,控制在100字以内。首先,我得通读整篇文章,理解其主要内容。 文章标题是关于Convercent举报平台的多个安全配置错误和客户枚举暴露问题。作者是Yuffie Kisaragi,日期是2025年12月4日。文章提到了EQS Group运营的这个平台存在多个安全漏洞,包括缺少HTTP安全头、重复的会话cookie、不一致的SameSite属性、不完善的点击劫持保护,以及一个未认证的API端点导致客户信息泄露。 漏洞的影响非常严重,特别是考虑到该平台处理的是举报信息和敏感数据,这些漏洞可能导致保密性、完整性和运营隐私受到威胁。文章还提到这些漏洞影响了多个客户实例,如Milliman、Röchling Group和BorgWarner,说明问题具有系统性。 总结部分需要涵盖主要的安全问题和影响。我需要确保在100字以内简洁明了地表达出来。可能的结构是先指出平台的问题,然后列举主要漏洞,最后说明影响。 比如:“Convercent举报平台存在多重安全配置错误和客户信息泄露风险。问题包括缺少关键HTTP安全头、重复会话cookie、不一致SameSite属性、不完善点击劫持保护及未认证API端点导致客户枚举。这些漏洞对保密性、完整性和隐私构成严重威胁。” 检查一下字数是否在限制内,并确保没有使用“文章内容总结”等开头用语。 </think> Convercent举报平台存在多重安全配置错误和客户信息泄露风险。问题包括缺少关键HTTP安全头、重复会话cookie、不一致SameSite属性、不完善点击劫持保护及未认证API端点导致客户枚举。这些漏洞对保密性、完整性和隐私构成严重威胁。 2025-12-5 18:2:18 Author: seclists.org(查看原文) 阅读量:7 收藏

fulldisclosure logo

Full Disclosure mailing list archives


From: Yuffie Kisaragi via Fulldisclosure <fulldisclosure () seclists org>
Date: Thu, 04 Dec 2025 16:27:53 +0000

Advisory ID: CONVERCENT-2025-001
Title: Multiple Security Misconfigurations and Customer Enumeration Exposure in
Convercent Whistleblowing Platform (EQS Group)
Date: 2025-12-04
Vendor: EQS Group
Product: Convercent Whistleblowing Platform (app.convercent.com)
Severity: Critical
CVSS v4.0 Base Score: 9.3
Vector: AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N

Summary

A series of security weaknesses were identified in the Convercent whistleblowing
platform operated by EQS Group. These issues include missing critical HTTP
security headers, insecure and duplicated session cookies, inconsistent SameSite
attributes, incomplete clickjacking protection, and an unauthenticated API
endpoint that leaks internal customer legal entities. The vulnerabilities were
observed on multiple customer instances (e.g., Milliman, Röchling Group,
BorgWarner) demonstrating that the weaknesses affect multiple Convercent tenants
and appear systemic.


Because Convercent processes sensitive whistleblower reports, internal
misconduct disclosures, and protected-identity information, these
vulnerabilities pose a severe risk to confidentiality, integrity, and
operational privacy.


Findings

1. Missing Critical Security Headers

The platform does not send several essential browser security headers,
including:

- Content-Security-Policy
- Referrer-Policy
- Permissions-Policy
- Cross-Origin-Embedder-Policy
- Cross-Origin-Opener-Policy
- Cross-Origin-Resource-Policy

The lack of these protections leaves Convercent pages vulnerable to cross-site
scripting, clickjacking, browser API misuse, cross-origin data leakage, and
weakened process isolation.

2. Weak HSTS Configuration and Formatting Issues

The platform currently sends the following Strict-Transport-Security header:

- Strict-Transport-Security: max-age=86400;includeSubDomains

This configuration uses an unusually small max-age value (24 hours), causing
browsers to quickly discard the HTTPS-only policy and leaving users vulnerable
to downgrade and SSL-stripping attacks. The missing space after the semicolon
(;includeSubDomains) is not an RFC violation but may affect parsing reliability
in certain intermediaries or older clients, reducing consistency and enforcement
of security expectations.

A more robust and industry-aligned configuration would be:
- Strict-Transport-Security: max-age=31536000; includeSubDomains; preload

This longer duration, proper formatting, and optional preload directive provide
stronger, long-term HTTPS enforcement appropriate for a high-sensitivity
whistleblowing platform.

3. Duplicate Session Cookies
Multiple instances were found issuing two identical ASP.NET_SessionId cookies.

Duplicate session cookies may cause authentication instability, session override
conditions, and session fixation. This constitutes a protection mechanism
failure (CWE-693) and may indicate inconsistent load balancer or
application-layer handling.

4. Missing Secure Attribute on Affinity Cookie

One affinity cookie (ApplicationGatewayAffinity) lacked the Secure attribute,
exposing session metadata to potential interception on non-encrypted channels.
This is a serious misconfiguration for a system that handles sensitive
disclosures.

5. Inconsistent SameSite Attributes

Cookies within the platform defined mixed or absent SameSite values.

Such inconsistency may permit cross-site request leakage, session forwarding to
unintended origins, and unpredictable behavior in modern browsers. This
increases exposure to CSRF and related session compromise risks.

6. Incomplete Clickjacking Protection

The platform sets X-Frame-Options twice but does not define modern framing
restrictions using Content-Security-Policy’s frame-ancestors directive. As a
result, clickjacking protection is incomplete and can be bypassed.

7. Customer Enumeration via Unauthenticated API Endpoint

An unauthenticated API endpoint was found:

https://app.convercent.com/en-US/Anonymous/IssueIntake/GetLegalEntity?searchText=

This endpoint returns internal customer legal entities based on the supplied
search fragment.

By querying the endpoint with common legal-suffix search terms such as “plc”,
“ag”, “sa”, “nv”, “ab”, “publ”, “oyj”, “asa”, it is possible to identify
publicly traded companies using Convercent. Since these suffixes correspond to
stock-quoted entities across various jurisdictions, attackers can derive a
meaningful portion of Convercent’s publicly listed customers.


E.g.:
-
https://app.convercent.com/en-US/Anonymous/IssueIntake/GetLegalEntity?searchText=plc
-
https://app.convercent.com/en-US/Anonymous/IssueIntake/GetLegalEntity?searchText=ag
-
https://app.convercent.com/en-US/Anonymous/IssueIntake/GetLegalEntity?searchText=sa
-
https://app.convercent.com/en-US/Anonymous/IssueIntake/GetLegalEntity?searchText=nv
-
https://app.convercent.com/en-US/Anonymous/IssueIntake/GetLegalEntity?searchText=ab
-
https://app.convercent.com/en-US/Anonymous/IssueIntake/GetLegalEntity?searchText=publ
-
https://app.convercent.com/en-US/Anonymous/IssueIntake/GetLegalEntity?searchText=oyj
-
https://app.convercent.com/en-US/Anonymous/IssueIntake/GetLegalEntity?searchText=asa

Critical Implications of Customer Enumeration

- Identification of organizations using the platform, even when such information
is not publicly disclosed;
- Construction of target lists for phishing, insider-trading intelligence,
extortion attempts, or regulatory exploitation;
- Exposure of sensitive business relationships and internal compliance
structures;
- Automated harvesting of thousands of customer entities through scriptable,
unauthenticated queries;
- Violation of expected confidentiality surrounding whistleblower
infrastructure, which is often deliberately undisclosed.

Impact

Confidentiality: High
Sensitive metadata, session information, and customer identity details can be
disclosed.

Integrity: High
Session fixation, cookie manipulation, and framing attacks could enable
unauthorized actions.

Availability: No
The vulnerabilities do not directly impair availability.

Scope: Changed
The absence of COOP/COEP and the presence of cross-origin weaknesses enable
privilege extension beyond the originating tenant.

Given the nature of data processed by whistleblowing systems, these weaknesses
represent a critical failure of security design and operational hardening.


Mitigation

The Convercent platform should implement the following:


Enforce modern security headers:

- Content-Security-Policy
- Referrer-Policy
- Permissions-Policy
- COEP, COOP, CORP


Revices HTSTS configuration.

Ensure only one session cookie is issued and add Secure and consistent SameSite
attributes to all cookies.

Implement proper clickjacking protection using CSP frame-ancestors.

Remove or restrict the GetLegalEntity API endpoint or require authentication to
prevent customer enumeration.

Conduct a platform-wide review of cookie handling, tenant configuration, and
load balancer behavior.


Affected Examples

Publicly reachable Convercent instances exhibiting similar behavior include:

Milliman
https://app.convercent.com/en-US/LandingPage/c9d65965-b01f-ec11-a985-000d3ab9f062


Röchling Group
https://app.convercent.com/en-us/Anonymous/IssueIntake/LandingPage/06ab7f15-a3ab-ed11-a99a-000d3ab9f062


BorgWarner
https://app.convercent.com/en-us/Anonymous/IssueIntake/IdentifyOrganization


These examples illustrate that the vulnerabilities are not isolated to a single
tenant but reflect systemic issues across the Convercent platform.


Vendor Status

As of 2025-12-04, no mitigation has been observed. The vendor has not responded
to this disclosure.


Timeline:

2025-09-12 - Vulnerability discovered
2025-09-12 - Vendor contacted at security-vulnerability () eqs com using
responsible disclosure as for https://www.eqs.com/report-a-vulnerability/ (no
response)
2025-11-13 - Second vendor contact (no response)
2025-12-04 - Public disclosure


References

- OWASP Top 10 – A05:2021 Security Misconfiguration
- CWE-693: Protection Mechanism Failure
- NIST SP 800-53 Rev. 5 – SC-34, SC-18
- ISO/IEC 27001:2022 – 8.25 and 8.28


Disclaimer

All research supporting this advisory relied only on publicly available
endpoints and did not involve probing, exploitation, or any action that could
impact system integrity or user privacy. The intent of this publication is to
promote safer and more resilient security environments.
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: https://seclists.org/fulldisclosure/

Current thread:

  • Multiple Security Misconfigurations and Customer Enumeration Exposure in Convercent Whistleblowing Platform (EQS Group) Yuffie Kisaragi via Fulldisclosure (Dec 05)

文章来源: https://seclists.org/fulldisclosure/2025/Dec/4
如有侵权请联系:admin#unsafe.sh