TUCoPS :: HP Unsorted E :: bu-1797.htm

Enomaly ECP: Multiple vulnerabilities in VMcasting protocol & implementation.
Enomaly ECP: Multiple vulnerabilities in VMcasting protocol & implementation.
Enomaly ECP: Multiple vulnerabilities in VMcasting protocol & implementation.

Enomaly ECP: Multiple vulnerabilities in VMcasting protocol & implementation.


Enomaly ECP up to and including v3.0.4 is believed to contain an insecure
silent update mechanism that could allow a remote attacker to execute
arbitrary code as root, and to inject or modify VM workloads for execution
within user environment or to replay older, insecure workloads.

Both the Enomaly ECP implementation and the VMcasting protocol itself are
believed to be vulnerable.


Enomaly ECP is management software for virtual machines in cloud computing


Sam Johnston (http://samj.net/) of Australian Online Solutions
(http://www.aos.net.au) reported that the vmfeed module, an insecure
implementation of the insecure VMcasting protocol (http://www.vmcasting.org/)
includes a silent update mechanism that downloads and executes Python code
from Enomaly's corporate web server (http://enomaly.com/fileadmin/eggs/)
over HTTP, without authentication or integrity checks. The code is triggered
when the "application/python-egg" MIME type is encountered.

The module also contains functionality for downloading workloads (virtual
machines) from a feed which is itself retrieved over HTTP. While the VMcasting
protocol (http://www.vmcasting.org/) describes a mechanism for digitally
signing payloads, the mechanism is not implemented and there is no requirement
to transfer feeds securely (e.g. over HTTPS). The implementation itself
actively rejects URLs that do not start with "http" or "ftp" with an error.

The module has the following feeds hardcoded:
- Enomalism VMCasting Test Feed [http://enomalism.com/vmcast_appliances.php]
- VMCasting Production Module Feed [http://enomalism.com/vmcast_modules.php]


Combined with the ability to intercept requests to Enomaly's corporate web
server by other means such as ARP or DNS spoofing, or compromise the server
itself or any intermediary server, it may be possible to execute arbitrary
commands as the root user on any server requesting the feeds. It may also be
possible for an attacker to run workloads of their choice, to modify existing
workloads and to replay old, known-insecure workloads (even if signed).


Resolve enomalism.com and enomaly.com to in affected servers' hosts
files or migrate to OpenECP which includes fixes for the vulnerabilities.


There is no resolution at this time as the feature cannot be disabled. Vendor
did not confirm whether subsequent/future releases [will] address the problem.


2009-11-02 Open source distributions for Enomaly ECP removed from Internet.
2010-01-06 Email request for open source code Enomaly ECP code denied by CEO.
2010-02-03 Public discussion of vulnerability, verified in current source.
2010-02-03 Strategic Advisor & Board Member claims "Many of the items have
been addressed in [Service Provider Edition and soon to be released High
Assurance] editions. We will review your comments above for future inclusion
into our product road map". Fails to identify which issues remain.
2010-02-09 OpenECP forked from Enomaly ECP, resolves vulnerabilities.
2010-02-09 Chief Technologist claims "ECP 3.0 is a significantly different
product than 2.0 servicing different market needs. [...] Technically ECP2.0
was Enomalism 2.0, not the Elastic Computing platform."
2010-02-10 Changelogs showing common lineage are removed from Internet.
2010-02-?? http://src.enomaly.com is restored claiming "Our current platform,
Enomaly ECP Service Provider Edition, is a completely different product."
2010-02-16 Vulnerability report released unverified.

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH