lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CALEZFfnuK6Ne+s3y9syKXtxMka__38zjbR+YHJJPneyV74EztQ@mail.gmail.com>
Date: Mon, 8 Oct 2012 07:55:40 -0700
From: Travis Lee <eelsivart@...il.com>
To: bugtraq@...urityfocus.com
Subject: Key Systems Electronic Key Lockers command injection and weak
 authentication vulnerabilities

OVERVIEW
Key Systems Electronic Key Lockers contain a command injection
vulnerability which may allow a remote unauthenticated attacker to
inject commands into the electronic key locker. Key Systems Electronic
Key Lockers also contains weak authentication which could allow an
attacker administrative access to the electronic key locker.


DESCRIPTION
Key Systems Electronic Key Lockers run a management listener on
tcp/1010 which is used for communication between the electronic key
locker and the master authentication server. It is possible for an
attacker to send plaintext commands to tcp/1010 to have the electronic
key locker perform various functions such as unlock/lock the physical
device or change the device's configuration.

The Key Systems Electronic Key Locker also contains a web server which
is vulnerable to weak authentication. The authentication credentials
required to log into the web server are a username (default is
“admin”) and a 4 digit PIN number which can be easily brute-forced
using a HTTP GET request,
http://x.x.x.x/?Function=Auth&authorize=on&uid=admin&login=5555. The
web interface allows for the user to unlock/lock the device and to
change the configuration.


IMPACT
An unauthenticated remote attacker with network access to the Key
Systems Electronic Key Locker can perform various functions such as
unlock/lock the physical device to gain physical access to the
contents of the locker, or change the device's configuration, or
brute-force web server management user accounts.


WORKAROUNDS
Restrict access

As a general good security practice, only allow connections from
trusted hosts and networks. Restricting access would prevent an
attacker from accessing a Key Systems Electronic Key Locker using
stolen credentials from a blocked network location.


REFERENCES
http://www.keystorage.com/electroniccabinets.htm


NOTE: This was reported to CERT and was about to be published, but the
vendor stated that this is a non-standard, non-default configuration
so it was not published. The fact is that it can be configured and
used in this way and I think lots of clients probably do.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ