From: Yuffie Kisaragi via Fulldisclosure <fulldisclosure () seclists org>
Date: Thu, 04 Dec 2025 16:27:53 +0000
Advisory ID: CONVERCENT-2025-001
Title: Multiple Security Misconfigurations and Customer Enumeration Exposure in
Convercent Whistleblowing Platform (EQS Group)
Date: 2025-12-04
Vendor: EQS Group
Product: Convercent Whistleblowing Platform (app.convercent.com)
Severity: Critical
CVSS v4.0 Base Score: 9.3
Vector: AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N
Summary
A series of security weaknesses were identified in the Convercent whistleblowing
platform operated by EQS Group. These issues include missing critical HTTP
security headers, insecure and duplicated session cookies, inconsistent SameSite
attributes, incomplete clickjacking protection, and an unauthenticated API
endpoint that leaks internal customer legal entities. The vulnerabilities were
observed on multiple customer instances (e.g., Milliman, Röchling Group,
BorgWarner) demonstrating that the weaknesses affect multiple Convercent tenants
and appear systemic.
Because Convercent processes sensitive whistleblower reports, internal
misconduct disclosures, and protected-identity information, these
vulnerabilities pose a severe risk to confidentiality, integrity, and
operational privacy.
Findings
1. Missing Critical Security Headers
The platform does not send several essential browser security headers,
including:
- Content-Security-Policy
- Referrer-Policy
- Permissions-Policy
- Cross-Origin-Embedder-Policy
- Cross-Origin-Opener-Policy
- Cross-Origin-Resource-Policy
The lack of these protections leaves Convercent pages vulnerable to cross-site
scripting, clickjacking, browser API misuse, cross-origin data leakage, and
weakened process isolation.
2. Weak HSTS Configuration and Formatting Issues
The platform currently sends the following Strict-Transport-Security header:
- Strict-Transport-Security: max-age=86400;includeSubDomains
This configuration uses an unusually small max-age value (24 hours), causing
browsers to quickly discard the HTTPS-only policy and leaving users vulnerable
to downgrade and SSL-stripping attacks. The missing space after the semicolon
(;includeSubDomains) is not an RFC violation but may affect parsing reliability
in certain intermediaries or older clients, reducing consistency and enforcement
of security expectations.
A more robust and industry-aligned configuration would be:
- Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
This longer duration, proper formatting, and optional preload directive provide
stronger, long-term HTTPS enforcement appropriate for a high-sensitivity
whistleblowing platform.
3. Duplicate Session Cookies
Multiple instances were found issuing two identical ASP.NET_SessionId cookies.
Duplicate session cookies may cause authentication instability, session override
conditions, and session fixation. This constitutes a protection mechanism
failure (CWE-693) and may indicate inconsistent load balancer or
application-layer handling.
4. Missing Secure Attribute on Affinity Cookie
One affinity cookie (ApplicationGatewayAffinity) lacked the Secure attribute,
exposing session metadata to potential interception on non-encrypted channels.
This is a serious misconfiguration for a system that handles sensitive
disclosures.
5. Inconsistent SameSite Attributes
Cookies within the platform defined mixed or absent SameSite values.
Such inconsistency may permit cross-site request leakage, session forwarding to
unintended origins, and unpredictable behavior in modern browsers. This
increases exposure to CSRF and related session compromise risks.
6. Incomplete Clickjacking Protection
The platform sets X-Frame-Options twice but does not define modern framing
restrictions using Content-Security-Policy’s frame-ancestors directive. As a
result, clickjacking protection is incomplete and can be bypassed.
7. Customer Enumeration via Unauthenticated API Endpoint
An unauthenticated API endpoint was found:
https://app.convercent.com/en-US/Anonymous/IssueIntake/GetLegalEntity?searchText=
This endpoint returns internal customer legal entities based on the supplied
search fragment.
By querying the endpoint with common legal-suffix search terms such as “plc”,
“ag”, “sa”, “nv”, “ab”, “publ”, “oyj”, “asa”, it is possible to identify
publicly traded companies using Convercent. Since these suffixes correspond to
stock-quoted entities across various jurisdictions, attackers can derive a
meaningful portion of Convercent’s publicly listed customers.
E.g.:
-
https://app.convercent.com/en-US/Anonymous/IssueIntake/GetLegalEntity?searchText=plc
-
https://app.convercent.com/en-US/Anonymous/IssueIntake/GetLegalEntity?searchText=ag
-
https://app.convercent.com/en-US/Anonymous/IssueIntake/GetLegalEntity?searchText=sa
-
https://app.convercent.com/en-US/Anonymous/IssueIntake/GetLegalEntity?searchText=nv
-
https://app.convercent.com/en-US/Anonymous/IssueIntake/GetLegalEntity?searchText=ab
-
https://app.convercent.com/en-US/Anonymous/IssueIntake/GetLegalEntity?searchText=publ
-
https://app.convercent.com/en-US/Anonymous/IssueIntake/GetLegalEntity?searchText=oyj
-
https://app.convercent.com/en-US/Anonymous/IssueIntake/GetLegalEntity?searchText=asa
Critical Implications of Customer Enumeration
- Identification of organizations using the platform, even when such information
is not publicly disclosed;
- Construction of target lists for phishing, insider-trading intelligence,
extortion attempts, or regulatory exploitation;
- Exposure of sensitive business relationships and internal compliance
structures;
- Automated harvesting of thousands of customer entities through scriptable,
unauthenticated queries;
- Violation of expected confidentiality surrounding whistleblower
infrastructure, which is often deliberately undisclosed.
Impact
Confidentiality: High
Sensitive metadata, session information, and customer identity details can be
disclosed.
Integrity: High
Session fixation, cookie manipulation, and framing attacks could enable
unauthorized actions.
Availability: No
The vulnerabilities do not directly impair availability.
Scope: Changed
The absence of COOP/COEP and the presence of cross-origin weaknesses enable
privilege extension beyond the originating tenant.
Given the nature of data processed by whistleblowing systems, these weaknesses
represent a critical failure of security design and operational hardening.
Mitigation
The Convercent platform should implement the following:
Enforce modern security headers:
- Content-Security-Policy
- Referrer-Policy
- Permissions-Policy
- COEP, COOP, CORP
Revices HTSTS configuration.
Ensure only one session cookie is issued and add Secure and consistent SameSite
attributes to all cookies.
Implement proper clickjacking protection using CSP frame-ancestors.
Remove or restrict the GetLegalEntity API endpoint or require authentication to
prevent customer enumeration.
Conduct a platform-wide review of cookie handling, tenant configuration, and
load balancer behavior.
Affected Examples
Publicly reachable Convercent instances exhibiting similar behavior include:
Milliman
https://app.convercent.com/en-US/LandingPage/c9d65965-b01f-ec11-a985-000d3ab9f062
Röchling Group
https://app.convercent.com/en-us/Anonymous/IssueIntake/LandingPage/06ab7f15-a3ab-ed11-a99a-000d3ab9f062
BorgWarner
https://app.convercent.com/en-us/Anonymous/IssueIntake/IdentifyOrganization
These examples illustrate that the vulnerabilities are not isolated to a single
tenant but reflect systemic issues across the Convercent platform.
Vendor Status
As of 2025-12-04, no mitigation has been observed. The vendor has not responded
to this disclosure.
Timeline:
2025-09-12 - Vulnerability discovered
2025-09-12 - Vendor contacted at security-vulnerability () eqs com using
responsible disclosure as for https://www.eqs.com/report-a-vulnerability/ (no
response)
2025-11-13 - Second vendor contact (no response)
2025-12-04 - Public disclosure
References
- OWASP Top 10 – A05:2021 Security Misconfiguration
- CWE-693: Protection Mechanism Failure
- NIST SP 800-53 Rev. 5 – SC-34, SC-18
- ISO/IEC 27001:2022 – 8.25 and 8.28
Disclaimer
All research supporting this advisory relied only on publicly available
endpoints and did not involve probing, exploitation, or any action that could
impact system integrity or user privacy. The intent of this publication is to
promote safer and more resilient security environments.
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: https://seclists.org/fulldisclosure/
Current thread:
- Multiple Security Misconfigurations and Customer Enumeration Exposure in Convercent Whistleblowing Platform (EQS Group) Yuffie Kisaragi via Fulldisclosure (Dec 05)