[prev in list] [next in list] [prev in thread] [next in thread]
List: bugtraq
Subject: PayPal Inc Bug Bounty #114 - JDWP Remote Code Execution Vulnerability
From: Vulnerability Lab <research () vulnerability-lab ! com>
Date: 2015-04-28 13:05:02
Message-ID: 553F857E.2060803 () vulnerability-lab ! com
[Download RAW message or body]
Document Title:
===============
PayPal Inc Bug Bounty #114 - JDWP Remote Code Execution Vulnerability
References (Source):
====================
http://www.vulnerability-lab.com/get_content.php?id=1474
Video: http://www.vulnerability-lab.com/get_content.php?id=1474
Vulnerability Magazine: \
http://magazine.vulnerability-db.com/?q=articles/2015/04/28/paypal-inc-bug-bounty-jdwp-remote-code-execution-vulnerability
Release Date:
=============
2015-04-28
Vulnerability Laboratory ID (VL-ID):
====================================
1474
Common Vulnerability Scoring System:
====================================
9.3
Product & Service Introduction:
===============================
PayPal is a global e-commerce business allowing payments and money transfers to be \
made through the Internet. Online money transfers serve as electronic alternatives \
to paying with traditional paper methods, such as checks and money orders. \
Originally, a PayPal account could be funded with an electronic debit from a bank \
account or by a credit card at the payer s choice. But some time in 2010 or early \
2011, PayPal began to require a verified bank account after the account holder \
exceeded a predetermined spending limit. After that point, PayPal will attempt to \
take funds for a purchase from funding sources according to a specified funding \
hierarchy. If you set one of the funding sources as Primary, it will default to that, \
within that level of the hierarchy (for example, if your credit card ending in 4567 \
is set as the Primary over 1234, it will still attempt to pay money out of your \
PayPal balance, before it attempts to charge your credit card). The funding hierarchy \
is a balance in the PayPal account; a PayPal credit account, PayPal Extras, PayPal \
SmartConnect, PayPal Extras Master Card or Bill Me Later (if selected as primary \
funding source) (It can bypass the Balance); a verified bank account; other funding \
sources, such as non-PayPal credit cards. The recipient of a PayPal transfer can \
either request a check from PayPal, establish their own PayPal deposit account or \
request a transfer to their bank account.
PayPal is an acquirer, performing payment processing for online vendors, auction \
sites, and other commercial users, for which it charges a fee. It may also charge a \
fee for receiving money, proportional to the amount received. The fees depend on the \
currency used, the payment option used, the country of the sender, the country of \
the recipient, the amount sent and the recipient s account type. In addition, eBay \
purchases made by credit card through PayPal may incur extra fees if the buyer and \
seller use different currencies.
On October 3, 2002, PayPal became a wholly owned subsidiary of eBay. Its corporate \
headquarters are in San Jose, California, United States at eBay s North First Street \
satellite office campus. The company also has significant operations in Omaha, \
Nebraska, Scottsdale, Arizona, and Austin, Texas, in the United States, Chennai, \
Dublin, Kleinmachnow (near Berlin) and Tel Aviv. As of July 2007, across Europe, \
PayPal also operates as a Luxembourg-based bank.
On March 17, 2010, PayPal entered into an agreement with China UnionPay (CUP), China \
s bankcard association, to allow Chinese consumers to use PayPal to shop \
online.PayPal is planning to expand its workforce in Asia to 2,000 by the end of the \
year 2010.
(Copy of the Homepage: www.paypal.com) [http://en.wikipedia.org/wiki/PayPal]
Abstract Advisory Information:
==============================
An independent Vulnerability Laboratory Researcher discovered a remote code execution \
vulnerability in the official PayPal Inc Marketing online-service web-application.
Vulnerability Disclosure Timeline:
==================================
2015-04-05: Researcher Notification & Coordination (Milan A Solanki - \
Safehacking4mas)
2015-04-06: Vendor Notification (PayPal Inc - Security & Bug Bounty Team)
2015-04-07: Vendor Response/Feedback (PayPal Inc - Security & Bug Bounty Team)
2015-04-09: Vendor Fix/Patch (PayPal Inc - Developer Team)
2015-04-28: Public Disclosure (Vulnerability Laboratory)
Discovery Status:
=================
Published
Affected Product(s):
====================
PayPal Inc
Product: Marketing Application & Service (HK) 2015 Q2
Exploitation Technique:
=======================
Remote
Severity Level:
===============
Critical
Technical Details & Description:
================================
A remote code execution vulnerability has been discovered in the JDWP protocol of the \
PayPal Inc Marketing online service web-server. The vulnerability allows remote \
attackers to execute system specific code against a target system to compromise the \
webserver.
The Java Debug Wire Protocol (JDWP) is the protocol used for communication between a \
debugger and the Java virtual machine (VM) which it debugs (hereafter called the \
target VM). JDWP is one layer within the Java Platform Debugger Architecture (JPDA). \
JDWP does not use any authentication and could be abused by an attacker to execute \
arbitrary code on the affected server.
The tool that i used to disclose is the jdwp-shellifier. I scanned the marketing site \
and it had opened port 8000 (pre-auth) than i just executed after accepted \
connection my commands and finally disclosed a remote code execution issue.
Vulnerable Protocol(s):
[+] JDWP
Port(s):
[+] 8000
Proof of Concept (PoC):
=======================
The remote code execution web vulnerability can be exploited by remote attackers \
without privileged application user account or user interaction. For security \
demonstration or to reproduce the security vulnerability follow the provided \
information and steps below to continue.
Manual steps to reproduce the security vulnerability ...
1. Scan the site with the jdwp-shellifier tool \
(https://github.com/IOActive/jdwp-shellifier) 2. Open port 8000 and connect to the \
service without auth 3. Execute own server-side commands as root user
4. Successful reproduce of the vulnerability!
Note: Please watch the poc demo video!
Solution - Fix & Patch:
=======================
2015-04-09: Vendor Fix/Patch (PayPal Inc - Developer Team)
Security Risk:
==============
The security risk of the remote code execution vulnerability in the jdwp protocol is \
estimated as critical. (CVSS 9.3)
Credits & Authors:
==================
Milan A Solanki - (milans812@gmail.com) [www.safehacking4mas.blogspot.in]
Disclaimer & Information:
=========================
The information provided in this advisory is provided as it is without any warranty. \
Vulnerability Lab disclaims all warranties, either expressed or implied, including \
the warranties of merchantability and capability for a particular purpose. \
Vulnerability-Lab or its suppliers are not liable in any case of damage, including \
direct, indirect, incidental, consequential loss of business profits or special \
damages, even if Vulnerability-Lab or its suppliers have been advised of the \
possibility of such damages. Some states do not allow the exclusion or limitation of \
liability for consequential or incidental damages so the foregoing limitation may \
not apply. We do not approve or encourage anybody to break any vendor licenses, \
policies, deface websites, hack into databases or trade with fraud/stolen material.
Domains: www.vulnerability-lab.com - www.vuln-lab.com - \
www.evolution-sec.com
Contact: admin@vulnerability-lab.com - research@vulnerability-lab.com - \
admin@evolution-sec.com
Section: magazine.vulnerability-db.com - vulnerability-lab.com/contact.php \
- evolution-sec.com/contact
Social: twitter.com/#!/vuln_lab - facebook.com/VulnerabilityLab - \
youtube.com/user/vulnerability0lab
Feeds: vulnerability-lab.com/rss/rss.php - \
vulnerability-lab.com/rss/rss_upcoming.php - \
vulnerability-lab.com/rss/rss_news.php
Programs: vulnerability-lab.com/submit.php - \
vulnerability-lab.com/list-of-bug-bounty-programs.php - \
vulnerability-lab.com/register/
Any modified copy or reproduction, including partially usages, of this file requires \
authorization from Vulnerability Laboratory. Permission to electronically \
redistribute this alert in its unmodified form is granted. All other rights, \
including the use of other media, are reserved by Vulnerability-Lab Research Team or \
its suppliers. All pictures, texts, advisories, source code, videos and other \
information on this website is trademark of vulnerability-lab team & the specific \
authors or managers. To record, list (feed), modify, use or edit our material contact \
(admin@vulnerability-lab.com or research@vulnerability-lab.com) to get a permission.
Copyright © 2015 | Vulnerability Laboratory - [Evolution Security GmbH]â„¢
--
VULNERABILITY LABORATORY - RESEARCH TEAM
SERVICE: www.vulnerability-lab.com
CONTACT: research@vulnerability-lab.com
PGP KEY: http://www.vulnerability-lab.com/keys/admin@vulnerability-lab.com%280x198E9928%29.txt
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic