The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


Unauthenticated access to IBM Host On-Demand administration pages


<< Previous INDEX Search src / Print Next >>
Subject: Unauthenticated access to IBM Host On-Demand administration pages
Date: Mon, 11 Dec 2006 08:39:09 -0600
Message-ID: <6868F396F5637540AE9D274CC90BD88F025F73B2@FNEX01.fishsec.com.>
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Thread-Topic: Unauthenticated access to IBM Host On-Demand administration pages
Thread-Index: AccdMh1iQSvKdSSPQ6GlX3x88SQ/MQ==
From: "Ferguson, David (Kansas City)" <Dave.Ferguson@fishnetsecurity.com.>
To: <bugtraq@securityfocus.com.>, <full-disclosure@lists.grok.org.uk.>
X-OriginalArrivalTime: 11 Dec 2006 14:39:11.0675 (UTC) FILETIME=[1F7610B0:01C71D32]
X-Virus-Scanned: antivirus-gw at tyumen.ru

SUMMARY

Vulnerability found in: IBM WebSphere Host On-Demand (HOD)
Type: Unauthorized, remote access to HOD administration pages
Applies to: Version 6.0, 7.0, 8.0, and 9.0 (possibly 10.0)
Severity Level: High
Exploit Difficulty: Very Low
Initial Vendor Notification: approximately 11/3/2006
Discovered By: Dave Ferguson, FishNet Security

Secunia advisory location: http://secunia.com/advisories/22652

BACKGROUND

IBM's WebSphere Host On-Demand (HOD) provides a framework for accessing =
host applications and data
from a Java-enabled web browser.  The HOD administration pages consist =
of a set of Java applets.  One
applet controls user authentication.  Others allow you to start and stop =
services, manage users,
configure telnet redirectors, set up LDAP service, and manage licenses.  =
Information about HOD can be
found here: http://www-306.ibm.com/software/webservers/hostondemand.

VULNERABILITY OVERVIEW

FishNet Security discovered that a remote, unauthenticated user can =
access and interact with several
of the HOD administration applets.  Essentially, a simple URL =
manipulation attack can bypass the
authentication and authorization process.  This was found in HOD =
versions 6.0, 7.0, 8.0, and 9.0.
Version 10 (released in 2006) may also be vulnerable, but was not =
tested.

DETAILS

The applet that handles user authentication is normally located at the =
following URL:
https://server/hod/HODAdmin.html.  Once this page loads and the applet =
is running, the URL showing in
the web browser reads something like this:
https://server/hod/frameset.html?Java2=3Dtrue,Obplet=3Dobject,cshe=3Dfals=
e,pnl=3DLogon,hgt=3D480,wth=3D640,full=3Dfa
lse,BrowserLocale=3Den.there.  The web page displays an area for the =
user to logon and a menu on the
left side with several links to other pages/applets.  Each of these =
links is disabled.  The links are:

- Introduction
- Users/Groups
- Services
- Redirector Service
- Directory Service
- OS/400 Proxy Server
- Licenses
- Logoff


To bypass the authentication process, you change the value of "pnl" in =
the current URL.  For example,
to see the OS/400 Proxy Server page, you would change the pnl parameter =
from "Logon" to "os400proxy".
The page loads and the functionality of the applet appears to be normal =
in every way.  The other links
in the menu become enabled, so changing the URL manually is no longer =
necessary.  Two of the
pages/applets seem to have additional access control, because the =
applets remain blank and/or empty
and can't be used.

Pages that could be accessed in an unauthenticated state:
Services, Redirector Service, Directory Service, and OS/400 Proxy Server

Pages that could NOT be accessed:
Users/Groups and Licenses

ATTACK SCENARIOS

An attacker can perpetrate a number of actions:

 - stopping critical HOD services
 - reconfiguring existing services (e.g., port numbers, ip addresses)
 - creating and starting unnecessary services
 - changing the security configuration for redirectors
 - creating a user to administer the LDAP service


Any of these could have an adverse effect on business operations and/or =
allow a malicious person to
open more potential attack vectors.

VENDOR RESPONSE

Secunia notified IBM about this vulnerability around 11/3/2006.  No =
response has been received.

CONTACT

You can reach the author of this advisory at: =
dave.ferguson[at]fishnetsecurity(dot)com



<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру