what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

A091100-1

A091100-1
Posted Sep 13, 2000
Site atstake.com

Atstake Security Advisory - Netegrity's SiteMinder is a web access control product for Solaris and Windows NT that implements various authentication mechanisms to protect content on websites. Due to an error in SiteMinder's URL parsing, it is possible for an attacker to bypass the authentication phase and view protected web pages directly.

tags | web
systems | windows, solaris
SHA-256 | e0d3f793315991d1bfe7a1596da57ae4a879f58a9bf6b103ecee5c49798552b3

A091100-1

Change Mirror Download
----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

@stake Inc.
www.atstake.com

Security Advisory

Advisory Name: SiteMinder Access Control Bypass (A091100-1)
Release Date: 09/11/2000
Application: Netegrity SiteMinder 3.6, 4.0
Platform: Solaris 2.x, Windows NT
Severity: Access control mechanism can be bypassed
Authors: David Litchfield (dlitchfield@atstake.com)
Mark Litchfield (mlitchfield@atstake.com)
Contributors: Frank Swiderski (fes@atstake.com)
Vendor Status: Vendor has released a patch
Web: www.atstake.com/research/advisories/2000/a091100-1.txt


Overview:

Netegrity's SiteMinder
(https://www.netegrity.com/products/siteminder.html) is a web access
control product for Solaris and Windows NT that implements various
authentication mechanisms to protect content on websites. It
features native integration with industry-standard LDAP, NDS, and
NT directory services as well as SQL databases.

SiteMinder supports more fine-grained access control than is
normally provided by web servers. For example, user access can be
restricted to the level of buttons or form fields whereas web servers
generally restrict access at the page level.

Due to an error in SiteMinder's URL parsing, it is possible for
an attacker to bypass the authentication phase and view protected web
pages directly.


Detailed Description:

SiteMinder's authentication mechanism can be bypassed by using
a properly crafted URL. For example, assume the following web page
is protected:

https://www.mysite.com/cgi-bin/secrets.html

Normally, if someone were to try accessing this page, SiteMinder
would intercept the request and prompt for a username and password
before allowing the user to execute the script and view the results.
However, the user can make a small modification to the URL to avoid
the authentication phase:

https://www.mysite.com/cgi-bin/secrets.html/$/foo.ccc

When using a URL crafted in this manner, SiteMinder appears to
ignore its access control policy and simply allows the requested page
to be served to the attacker with no further prompting.

This vulnerability can be used not only to view static web pages,
but also to execute CGI applications and to view server-side source
code. Again, all of these actions can be performed without ever
being prompted for authorization. Example URLs are as follows:

To execute a CGI application:

https://www.mysite.com/cgi-bin/restricted.cgi$/foo.ccc?subject=blah

To view the source code for that CGI application:

https://www.mysite.com/cgi-bin/restricted.cgi/$/foo.ccc

To execute a servlet:

https://www.mysite.com/applets/restricted/$/foo.ccc?query=blah


In the example URL, the non-existent file "foo.ccc" is used
after the "$/" delimiter; however, any filename can be used here
provided it has an extension of .ccc, .class, or .jpg (and possibly
others that have not yet been discovered).


Vendor Response (received via email from Netegrity):

Netegrity identified and fixed this issue earlier this year. The
issue does not exist in the currently shipping SiteMinder 4.11
product, which has already been distributed to all customers on
maintenance. Customers using previous versions of SiteMinder have
been notified of the issue and alerted that they can download the
patch from the customer support section of the Netegrity web site.
Customers can also call customer service at 800-325-9870 with any
questions or concerns.


Recommendations:

First install the vendor patch. The patch does *not* fix the
protection of URLs that do not have a file extensions which is
commonly the case for CGI programs and servlets. An example is the
following:

https://www.mysite.com/applets/restricted

In this case add a file extension so that the patch will work.

https://www.mysite.com/applets/restricted.applet



For more advisories: https://www.atstake.com/research/index.html
PGP Key: https://www.atstake.com/research/pgp_key.asc

Copyright 2000 @stake, Inc. All rights reserved.


-----BEGIN PGP SIGNATURE-----
Version: PGP 6.5.8

iQA/AwUBObzUJFESXwDtLdMhEQIN7ACcDOTd1yzs9Tj+QNeylT3zHY3clnMAoJ83
wjBdhSk2Qbq6/6klpyOKClN5
=I27D
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close