what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

JFrog Artifactory Pro 6.5.9 Signature Validation

JFrog Artifactory Pro 6.5.9 Signature Validation
Posted Mar 19, 2019
Authored by Timo Juhani Lindfors

The SAML SSO addon in JFrog Artifactory version 6.5.9 does not properly validate the XML signature in the SAMLResponse field send to the URL /webapp/saml/loginResponse. An attacker can use this flaw to login as any user if they already can login as some user.

tags | exploit
advisories | CVE-2018-19971
SHA-256 | 2210b15f819271c6a55202eb862e9978ee5dcea5cb47625f5426dc464569ec4d

JFrog Artifactory Pro 6.5.9 Signature Validation

Change Mirror Download

CVE-2018-19971: JFrog Artifactory Pro SAML SSO signature validation error
-------------------------------------------------------------------------

Affected products
=================

The SAML SSO addon in Artifactory 6.5.9 is vulnerable.
The SAML SSO addon in Artifactory 6.5.13 is NOT vulnerable.

Other versions were not tested.

Background
==========

"Artifactory offers a SAML-based Single Sign-On service allowing
federated Artifactory partners (identity providers) full control over
the authorization process.

Using SAML, Artifactory acts as service provider which receives
users' authentication information from external identity providers.
The SAML SSO addon in Artifactory Pro"

-- https://www.jfrog.com/confluence/display/RTF/SAML+SSO+Integration

Description
===========

The SAML SSO addon in Artifactory 6.5.9 does not properly validate the
XML signature in the SAMLResponse field send to the URL
/webapp/saml/loginResponse. An attacker can use this flaw to login as
any user if they already can login as some user.

Let's assume that the attacker has obtained a valid SAML message of
the form

Root
- Assertion id="original"
- Subject
- Signature
- SignedInfo
- Reference URI="original"

where the URI attribute of the Reference element points to the
Assertion element.

If we introduce a new Assertion element and make the original
Assertion and Signature elements its children we end up with the
message

Root
- Assertion id="evil"
- Subject
- Assertion id="original"
- Subject
- Signature
- SignedInfo
- Reference URI="original"

When Artifactory processes this message it looks for the Signature
element and checks that the original assertion is signed
properly. However, it then proceeds to use the Subject information
from the evil assertion which is fully under attacker's control.

Exploit
=======

If you want to test this vulnerability you can fetch a fork of the
SAMLRaider tool from https://github.com/lindi2/SAMLRaider and then
select "XSW9" from the drop-down list.

You might also want to take a look at the SAMLRaider documentation
that shows how this variant differs from earlier similar
vulnerabilities:

https://github.com/lindi2/SAMLRaider/blob/af73ee4a71e3125188496da29a83799fdb41d8e8/src/main/resources/xswlist.png

(The original documentation contained only bitmap images of text so it
was not very easy to add new variants.)

Author
======

This issue was discovered by Timo Lindfors from Nixu Corporation.

Timeline
========

2018-12-07: Issue reported to vendor.
2018-12-08: Mitre assigns CVE-2018-19971 to this vulnerability.
2018-12-17: JFrog releases a fix in Artifactory 6.5.13.


Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close