lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Mon, 29 Jun 2015 23:51:09 +0300
From: "MustLive" <mustlive@...security.com.ua>
To: <submissions@...ketstormsecurity.org>,
	<fulldisclosure@...lists.org>
Subject: [FD] XXE Injection in NetIQ Access

Hello list!

I'll give you additional information concerning advisory Multiple high risk 
vulnerabilities in NetIQ Access Manager 
(http://securityvulns.ru/docs31510.html). There are five different 
vulnerabilities in the advisory. For my attack it's needed to use only one 
vulnerability, XML External Entities Injection (XXE), to conduct attacks on 
other web sites from target host.

-------------------------
Affected products:
-------------------------

NetIQ Access Manager version 4.0 SP1 and previous versions.

-------------------------
Affected vendors:
-------------------------

Novell.

----------
Details:
----------

NetIQ Access Manager is vulnerable to XXE Injection.

Besides standard vectors of attacks with XXE Injection vulnerabilities (such 
as local file inclusion), which are usually mentioned in advisories, XXE 
Injection also allows to conduct attacks on other sites. And with using 
DAVOSET (DDoS attacks via other sites execution tool) it's possible to 
automate such attacks.

XML External Entities (XXE) (WASC-43):

https://site:8443/nps/servlet/webacc?taskId=fw.PreviewObjectFilter&nextState=initialState&merge=fw.TCPreviewFilter&query=<!DOCTYPE+request+[%0a<!ENTITY+xxe+SYSTEM+"http://target">%0a]><query><container>%26xxe%3b</container><subclasses>false</subclasses></query>

I wrote about such attacks in my 2012's article "Using XML External Entities 
(XXE) for attacks on other sites" 
(http://lists.webappsec.org/pipermail/websecurity_lists.webappsec.org/2012-August/008481.html) 
and 2013's "Using XXE vulnerabilities for attacks on other sites" 
(http://lists.webappsec.org/pipermail/websecurity_lists.webappsec.org/2013-August/008887.html). 
As I described in my articles, XXE vulnerabilities can be used for 
conducting CSRF and DoS attacks on other sites (and at using multiple web 
sites it's possible to conduct DDoS attacks). And my tool DAVOSET can be 
used for conducting such attacks via XXE vulnerabilities.

Video demonstration of DAVOSET: http://www.youtube.com/watch?v=RKi35-f346I

So all vulnerable versions of NetIQ Access Manager can be used for attacks 
on other sites via XXE Injection.

Best wishes & regards,
MustLive
Administrator of Websecurity web site
http://websecurity.com.ua 


_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ