Bài liên quan
Advisory: Endeca Latitude Cross-Site Request ForgeryRedTeam Pentesting discovered a Cross-Site Request Forgery (CSRF)vulnerability in Endeca Latitude. Using this vulnerability, an attackermight be able to change several different settings of the EndecaDetails=======Product: Endeca LatitudeAffected Versions: 2.2.2, potentially othersFixed Versions: N/AVulnerability Type: Cross-Site Request ForgerySecurity Risk: lowVendor URL: N/AVendor Status: decided not to fixAdvisory URL: https://www.redteam-pentesting.de/advisories/rt-sa-2013-002Advisory Status: publishedCVE: CVE-2014-2399CVE URL: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2399Introduction============Endeca Latitude is an enterprise data discovery platform for advanced,yet intuitive, exploration and analysis of complex and varied data.Information is loaded from disparate source systems and stored in afaceted data model that dynamically supports changing data. Thisintegrated and enriched data is made available for search, discovery,and analysis via interactive and configurable applications.(from the vendor's homepage)More Details============Endeca Latitude offers administrators the ability to perform differentadministrative and configuration operations by accessing URLs.These URLs are not secured by a randomly generated token and thereforeare prone to Cross-Site Request Forgery attacks.For example by accessing the URL http://example.com/admin?op=exit anadministrator can shut down the Endeca Latitude instance. Several otherURLs exist (as documented at [1] and [2]) which can be used to triggeroperations such as flushing cashes or changing the logging settings.Proof of Concept================An attacker might prepare a website, which can trigger arbitraryfunctionality (see [1] and [2]) of an Endeca Latitude instance ifsomeone opens the attacker's website in a browser that can reach EndecaLatitude. An easy way to implement this is to embed a hidden image intoan arbitrary website which uses the corresponding URL as its source:<img src="http://example.com/admin?op=exit" style="display:hidden" /><img src="http://example.com/config?op=log-disable" style="display:hidden" />[...]Workaround==========The vendor did not update the vulnerable software, but recommends toconfigure all installations to require mutual authentication using TLScertificates for both servers and clients, while discouraging users frominstalling said client certificates in browsers.Fix===Not available. The vendor did not update the vulnerable software toremedy this issue.Security Risk=============The vulnerability can enable attackers to be able to interact with anEndeca Latitude instance in different ways. Possible attacks include thechanging of settings as well as denying service by shutting down arunning instance. Attackers mainly benefit from this vulnerability ifthe instance is not already available to them, but for example only torestricted IP addresses or after authentication. Since this makes itharder to identify potential target systems and the attack mainly allowsto disturb the service until it is re-started, the risk of thisvulnerability is considered to be low.Timeline========2013-10-06 Vulnerability identified2013-10-08 Customer approved disclosure to vendor2013-10-15 Vendor notified2013-10-17 Vendor responded that investigation/fixing is in progress2014-02-24 Vendor responded that bug is fixed and scheduled for a future CPU2014-03-13 Vendor responded with additional information about a potential workaround2014-04-15 Vendor releases Critical Patch Update Advisory with little information on the proposed fix2014-04-16 More information requested from vendor2014-05-02 Vendor responds with updated information2014-06-25 Advisory releasedReferences==========[1] http://docs.oracle.com/cd/E29220_01/mdex.222/admin/toc.htm#List%20of%20administrative%20operations[2] http://docs.oracle.com/cd/E29220_01/mdex.222/admin/toc.htm#List%20of%20supported%20logging%20variablesRedTeam Pentesting GmbH=======================RedTeam Pentesting offers individual penetration tests, short pentests,performed by a team of specialised IT-security experts. Hereby, securityweaknesses in company networks or products are uncovered and can befixed immediately.As there are only few experts in this field, RedTeam Pentesting wants toshare its knowledge and enhance the public knowledge with research insecurity related areas. The results are made available as publicsecurity advisories.More information about RedTeam Pentesting can be found athttps://www.redteam-pentesting.de.-- RedTeam Pentesting GmbH Tel.: +49 241 510081-0Dennewartstr. 25-27 Fax : +49 241 510081-9952068 Aachen https://www.redteam-pentesting.deGermany Registergericht: Aachen HRB 14004Geschäftsführer: Patrick Hof, Jens Liebchen
Post a Comment