what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

ibmwebsphere-bypass.txt

ibmwebsphere-bypass.txt
Posted Dec 12, 2006
Authored by Dave Ferguson

IBM WebSphere Host On-Demand (HOD) versions 6.0 through 9.0 suffer from a URL manipulation flaw that allows for administrative bypass. Version 10.0 may also be susceptible.

tags | exploit, bypass
SHA-256 | 180a9ffd130b03530479c964bd2cae0050e0dfb3941fd1a11f5377d5f5296248

ibmwebsphere-bypass.txt

Change Mirror Download
SUMMARY

Vulnerability found in: IBM WebSphere Host On-Demand (HOD)
Type: Unauthorized, remote access to HOD administration pages
Applies to: Version 6.0, 7.0, 8.0, and 9.0 (possibly 10.0)
Severity Level: High
Exploit Difficulty: Very Low
Initial Vendor Notification: approximately 11/3/2006
Discovered By: Dave Ferguson, FishNet Security

Secunia advisory location: http://secunia.com/advisories/22652

BACKGROUND

IBM's WebSphere Host On-Demand (HOD) provides a framework for accessing host applications and data
from a Java-enabled web browser. The HOD administration pages consist of a set of Java applets. One
applet controls user authentication. Others allow you to start and stop services, manage users,
configure telnet redirectors, set up LDAP service, and manage licenses. Information about HOD can be
found here: http://www-306.ibm.com/software/webservers/hostondemand.

VULNERABILITY OVERVIEW

FishNet Security discovered that a remote, unauthenticated user can access and interact with several
of the HOD administration applets. Essentially, a simple URL manipulation attack can bypass the
authentication and authorization process. This was found in HOD versions 6.0, 7.0, 8.0, and 9.0.
Version 10 (released in 2006) may also be vulnerable, but was not tested.

DETAILS

The applet that handles user authentication is normally located at the following URL:
https://server/hod/HODAdmin.html. Once this page loads and the applet is running, the URL showing in
the web browser reads something like this:
https://server/hod/frameset.html?Java2=true,Obplet=object,cshe=false,pnl=Logon,hgt=480,wth=640,full=fa
lse,BrowserLocale=en.there. The web page displays an area for the user to logon and a menu on the
left side with several links to other pages/applets. Each of these links is disabled. The links are:

- Introduction
- Users/Groups
- Services
- Redirector Service
- Directory Service
- OS/400 Proxy Server
- Licenses
- Logoff

To bypass the authentication process, you change the value of "pnl" in the current URL. For example,
to see the OS/400 Proxy Server page, you would change the pnl parameter from "Logon" to "os400proxy".
The page loads and the functionality of the applet appears to be normal in every way. The other links
in the menu become enabled, so changing the URL manually is no longer necessary. Two of the
pages/applets seem to have additional access control, because the applets remain blank and/or empty
and can't be used.

Pages that could be accessed in an unauthenticated state:
Services, Redirector Service, Directory Service, and OS/400 Proxy Server

Pages that could NOT be accessed:
Users/Groups and Licenses

ATTACK SCENARIOS

An attacker can perpetrate a number of actions:

- stopping critical HOD services
- reconfiguring existing services (e.g., port numbers, ip addresses)
- creating and starting unnecessary services
- changing the security configuration for redirectors
- creating a user to administer the LDAP service

Any of these could have an adverse effect on business operations and/or allow a malicious person to
open more potential attack vectors.

VENDOR RESPONSE

Secunia notified IBM about this vulnerability around 11/3/2006. No response has been received.

CONTACT

You can reach the author of this advisory at: dave.ferguson[at]fishnetsecurity(dot)com

Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close