|
COMMAND Multiple Vulnerabilities in SuperScout Web Reports Server SYSTEMS AFFECTED SurfControl SuperScout WebFilter PROBLEM In Matt Moore [matt@westpoint.ltd.uk] advisory [ID#:wp-02-0005] : Usernames and Passwords Retrievable. ------------------------------------ The file located at: http://reports-server:8888/surf/scwebusers contains the usernames and passwords for each user of the reports server. The usernames are in plain text, whilst the passwords are encrypted. Weak Encryption --------------- The encryption is implemented via a simple JavaScript, located at: http://reports-server:8888/surf/JavaScript/UserManager.js The EncryptString function takes two parameters 'text string' and 'key'. Unfortunately, the key is hard-coded into another javaScript function and hence it is trivial to decrypt the passwords. (The key is 'test'). The default administrative password, '3&8>>' decrypts to 'admin'. As a result of this, an attacker can access any reports available on the server. DoS via Large GET request ------------------------- Repeated large GET requests cause the reports service to consume 100% CPU, at which point it no longer services requests. The server does appear to recover eventually. However, this was not tested extensively. Triple Dot Directory Traversal ------------------------------ An attacker can retrieve any file on the server via a simple directory traversal attack, e.g. http://reports-server:8888/.../.../.../.../.../.../.../winnt/win.ini SQL Injection Vulnerability --------------------------- The various reports available are implemented as .dll's. Several of these perform no input validation, and hence it is possible that an attacker could execute arbitrary SQL queries against the database: http://reports-server:8888/SimpleBar.dll/RunReport ?...<various parameters> Note: ----- The banner returned by the server is 'MS-MFC-HttpSvr/1.0'. A search for this returned the following link: http://msdn.microsoft.com/library/default.asp?url=/library/en-us/vcsample98/ html/_sample_mfc_httpsvr.asp The reports server appears to be based on a sample application from Microsoft. Other servers based on this may be vulnerable to the directory traversal and DoS attacks. SOLUTION No patch available. Vendor supplied workaround: Disable the reports server and consider using a terminal session to the server to access the reports. This advisory is available online at: http://www.westpoint.ltd.uk/wp-02-0005.txt