The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[UNIX] IBM Tivoli Access Manager Directory Traversal


<< Previous INDEX Search src / Print Next >>
From: SecuriTeam <support@securiteam.com.>
To: [email protected]
Date: 5 Feb 2006 12:45:58 +0200
Subject: [UNIX] IBM Tivoli Access Manager Directory Traversal
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <20060205111617.82057582D@mail.tyumen.ru.>
X-Virus-Scanned: antivirus-gw at tyumen.ru

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -




  IBM Tivoli Access Manager Directory Traversal
------------------------------------------------------------------------


SUMMARY

" <http://www-306.ibm.com/software/tivoli/products/access-mgr-e-bus/>; 
Tivoli Access Manager for e-business is a versatile solution for 
authentication and authorization problems. Primarily focused on Web 
applications, Access Manager implementations vary from simple Single 
Sign-on (SSO) to more complex security infrastructure deployments."

IBM Tivoli Access Manager is vulnerable for directory traversal that allow 
authenticated attackers to retrieve any file from the system.

DETAILS

Vulnerable Systems:
 * IBM Tivoli Access Manager version 6.0.0
 * IBM Tivoli Access Manager version 5.1.0.10

IBM's TAM Plug-in contains a logout handler under the root web path named 
`pkmslogout'.  This handler is designed to log out authenticated users. 
The handler's display template can be specified by the `filename' request 
parameter. The value of this parameter is intended to be the partial path 
to a file on the web server which contains the page template.  This file 
path is vulnerable to directory traversal, and can be used to retrieve 
nearly arbitrary files from the web server hosting the TAM Plug-in.

For instance, if a vulnerable plug-in existed on the system 
tam.example.com, one could exploit the problem by hitting a URL such as:
http://tam.example.com/pkmslogout?filename=../../../../../../../etc/passwd

It appears this problem can only be triggered when the attacker is already 
authenticated through the Web Plug-in.

Vendor Status:
A generally available fix pack for version 5.1.0 and 6.0 was released by 
the vendor on 2006-02-03 and available as:

Fixpack 5.1.0-TIV-WPI-FP0017 is available at:  
<http://www-1.ibm.com/support/docview.wss?uid=swg24011562>; 
http://www-1.ibm.com/support/docview.wss?uid=swg24011562
Fixpack 6.0.0-TIV-WPI-FP0001 is available at:  
<http://www-1.ibm.com/support/docview.wss?uid=swg24011561>; 
http://www-1.ibm.com/support/docview.wss?uid=swg24011561

CVE Information:
 <http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0513>; 
CVE-2006-0513

Disclosure Timeline:
2005-12-05 IBM was first notified
2005-12-06 Initial response
2006-01-18 A patch for this issue was released (For versions 5.1.0)
2006-02-03 A generally available fix pack for version 5.1.0 and 6.0 was 
released
2006-02-03 Public Disclosure


ADDITIONAL INFORMATION

The information has been provided by  <mailto:advisories@vsecurity.com.> 
VSR Advisories.
The original article can be found at:  
<http://www.vsecurity.com/bulletins/advisories/2006/tam-file-retrieval.txt>; http://www.vsecurity.com/bulletins/advisories/2006/tam-file-retrieval.txt




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру