CVE-2016-4979: HTTPD webserver – X509 Client certificate based authentication can be bypassed when HTTP/2 is used [vs]

Posted by Dirk-Willem van Gulik on Jul 06

Security Advisory – Apache Software Foundation
Apache HTTPD WebServer / httpd.apache.org

X509 Client certificate based authentication can
be bypassed when HTTP/2 is used

CVE-2016-4979 / CVSS 7.5

The Apache HTTPD web server (from 2.4.18-2.4.20) did not validate a X509
client certificate correctly when experimental module for the HTTP/2
protocol is used to access a resource….

CVE ID Request : OpenFire multiple vulnerabilities

Posted by Sysdream Labs on Jul 06

# Several vulnerabilities doscovered in OpenFire version 3.10.2 to 4.0.1

## Product Description

**OpenFire** is an opensource project under GNU GPL licence. It provides a Jabber/XMPP server fully develloped in Java.
It’s develloped by the **Ignite realtime** community.
The actual version of the product is 4.0.2.

Official web site : http://igniterealtime.org/

Several vulnerabilities have been discovered between 2015, October and 2016,…

CIMA DocuClass ECM – Multiple Vulnerabilities

Posted by Karn Ganeshen on Jul 06

*CIMA DocuClass Enterprise Content Management – Multiple Vulnerabilities*

DocuClass is a modular and scalable enterprise content management (ECM)
solution that allows organizations to streamline internal operations by
significantly improving the way they manage their information within a
business process.

*Vendor Response*: None

*Vulnerability Findings*

1. *SQL Injection* [Post Auth]

DocuClass web application contains a SQL injection…

RS232-NET Converter (JTC-200) – Multiple vulnerabilities

Posted by Karn Ganeshen on Jul 06

*RS232-NET Converter (JTC-200) – Multiple vulnerabilities*

About RS232-NET Converter (model JTC-200)
http://www.jantek.com.tw/en/product/73

*Seen deployed in:*
CHTD, Chunghwa Telecom Co., Ltd. (Taiwan)
HiNet (Taiwan & China)
PT Comunicacoes (Portugal)
Sony Network Taiwan Limited (Taiwan)
Vodafone Portugal (Portugal)

*1. Weak Credential Management*
The RS232-NET Converter (model JTC-200) web administration interface uses
non-random default…

GNU Wget < 1.18 Arbitrary File Upload

Posted by Dawid Golunski on Jul 06

GNU Wget < 1.18 Arbitrary File Upload

URL: http://legalhackers.com/advisories/Wget-Arbitrary-File-Upload-Vulnerability-Exploit.txt

CVE-2016-4971

GNU Wget before 1.18 when supplied with a malicious URL (to a malicious or
compromised web server) can be tricked into saving an arbitrary remote file
supplied by an attacker, with arbitrary contents and filename under
the current directory and possibly other directories by writing to .wgetrc….

Instagram Block – Moderately Critical – Information Disclosure – SA-CONTRIB-2016-037

Description

This module enables you to authenticate with Instagram’s API via an intermediary service (instagram.yanniboi.com).
The module doesn’t sufficiently advise that your authentication tokens could be intercepted.

CVE identifier(s) issued

  • A CVE identifier will be requested, and added upon issuance, in accordance with Drupal Security Team processes.

Versions affected

  • Instagram Block 7.x-1.x versions prior to 7.x-1.4.

Drupal core is not affected. If you do not use the contributed Instagram Block module, there is nothing you need to do.

Solution

Install the latest version:

Also see the Instagram Block project page.

Reported by

Fixed by

Coordinated by

Contact and More Information

The Drupal security team can be reached at security at drupal.org or via the contact form at https://www.drupal.org/contact.

Learn more about the Drupal Security team and their policies, writing secure code for Drupal, and securing your site.

Follow the Drupal Security Team on Twitter at https://twitter.com/drupalsecurity

Executable installers are vulnerable^WEVIL (case 34): Microsoft's vs-community-*.exe susceptible to DLL hijacking

Posted by Stefan Kanthak on Jul 06

Hi @ll,

the executable installer for Microsoft’s Visual Studio 2015
Community Edition, available from <https://www.visualstudio.com/>,
is vulnerable to DLL hijacking: on a fully patched Windows 7 SP1
it loads the following DLLs from its “application directory”
instead of Windows’ “system directory”:
Version.dll, AppHelp.dll, NTMARTA.dll, CryptSP.dll, RPCRTRemote.dll

Additionally it loads…

Java Deserialization attacks on JBoss Middleware

Recent research by Chris Frohoff and Gabriel Lawrence has exposed gadget chains in various libraries that allow code to be executed during object deserialization in Java. They’ve done some excellent research, including publishing some code that allows anyone to serialize a malicious payload that when deserialized runs the operating system command of their choice, as the user which started the Java Virtual Machine (JVM). The vulnerabilities are not with the gadget chains themselves but with the code that deserializes them.

What is a gadget chain?

Perhaps the simplest example is a list. With some types of lists, it’s necessary to compare objects in order to determine their order in the list. For example a PriorityQueue orders objects by comparing them with each other during it’s construction. It takes a Comparator object which will call any method you choose on the objects in the list. Now if that method contains a call to Runtime.exec(), then you can execute that code during construction of the PriorityQueue object.

Mitigation

There are couple of ways in which this type of attack on the JVM can be mitigated:

  1. not deserializing untrusted objects;
  2. not having the classes used in the ‘gadget chain’ in the classpath;
  3. running the JVM as a non-root operating system user, with reduced privileges;
  4. egress filtering not allowing any outbound traffic other than that matching a connection for which the firewall already has an existing state table entry.

The first is the best approach, as it prevents every kind of gadget chain a malicious attacker can create, even one devised from classes in the JVM itself. The second is OK, but has it’s limits as there are new gadget chains made public often, and it’s hard to keep up with the growing tide of them. Fortunately Enterprise Application Platform (EAP) 6 introduced module classloader that restricts which classes are available in the classpath of each module. It’s much harder to find a classloader that has access to all the classes used by the gadget chain.

The 3rd and 4th option are just good general security practices. If you want to serve content on port 80 of your host, you should use a firewall, or load balancer to redirect requests from port 80 to the JVM on another port above 1024, where your unprivileged JVM process is listening. You should not run a JVM as root in order to bind to a port less than 1024, as doing so will allow a compromised JVM to run commands as root.

Egress filtering is particularly useful as a mitigation against deserialization attacks because output from the remote code execution is not returned to an attacker. The technique used by Java deserialization attacks results in the normal flow of Java execution being interrupted and an exception being thrown. So while an attacker has write and execute permissions of the user running the JVM, they don’t have access to read files or shell command output, unless they can open a new connection which “phones home”.

EAP 5

EAP 5 is still widely used, and does allow deserialization of untrusted objects via the Legacy Invoker Servlet. On top of that, its classloading structure is flat, with most libraries, including the classes from the gadget chains, available in the classpath. For anyone still running EAP 5 it is highly recommended to only bind the Legacy Invoker Servlet to a network interface card (NIC) which is not publicly accessible. This also applies to products layered on EAP 5, such as SOA-Platform (SOA-P) 5.

EAP 6 and EAP 7

While EAP 6, and EAP 7 are more robust because of the module classloader system, they can still be vulnerable. Users of these versions who are utilizing the clustering features should ensure that they are running their clustering on a dedicated Virtual Local Area Network (VLAN) and not over the Internet. That includes users of JBoss Data Grid (JDG) which uses the clustering features in the default configuration. If you don’t have a dedicated VLAN make sure you encrypt your clustering traffic. This issue is addressed in the JBoss Middleware product suite by the fix for CVE-2016-2141.

Summary

While deserialization attacks are a serious threat to JBoss Middleware, with the correct planning, and deployment configuration, the risk can be greatly reduced. Anyone running EAP 5, or layered products, should disable or restrict access to the Legacy Invoker Servlet, while anyone using the clustering feature in EAP should apply the fix for CVE-2016-2141, or make sure their clustering traffic is sent only over a dedicated VLAN.

Product

Red Hat JBoss Enterprise Application Platform Red Hat JBoss Data Grid

Tags

clustering eap security Security-Vulnerabilities