[prev in list] [next in list] [prev in thread] [next in thread] 

List:       full-disclosure
Subject:    [Full-disclosure] CVE-2013-5572
From:       Pablo_González <pablo.gonzalezpe () gmail ! com>
Date:       2013-09-25 10:22:08
Message-ID: CAEgbLPOaG9E3OHbxiLxejZhso-Y3AObzZKoY9jsjCSV35TfBBg () mail ! gmail ! com
[Download RAW message or body]

[Attachment #2 (multipart/alternative)]


Hello,

I attach information about CVE-2013-5572 (Zabbix leakage password).

================================================================

ID: CVE-2013-5572

Title: Vulnerability Leak Password Zabbix

Date: 23/08/2013

Status: Not Solved

Scope: Privilege Elevation

Author: Chema Alonso, Pablo González, Germán Sánchez

================================================================



There is a security bug on Zabbix 2.0.5. This bug allows to see a zabbix
user’s password, if this user has a open session in management console.
Potentially, This vulnerability allows to carry on an privilege elevation
affecting the way Active Directory resources on Enterprise Network are
accessed.



About Zabbix

------------



From Wikipedia : "Zabbix is a network management system application

[...] designed to monitor and track the status of various network

services, servers, and other network hardware."





Vulnerability description

-------------------------



First, once the user is able to open a console session in Zabbix, he or she
can access to the tab (Administration -> Users) where the various users of
the system are displayed.



The user that has been impersonated can view the application source code
finding there the password that interacts Zabbix, for example with the
domain controller.



The field that should be looked for in the source code of the website is
type = "password" id = "ldap_bind_password" name = "ldap_bind_password"
value = <password>.



Another option to discover the password supposes that, once the user
requests the refreshing the web page, the browser asks the user to store or
cache the password.



Affected versions and platforms

-------------------------------



This bug has been verified on the Zabbix 2.0.5. Although the bug can
probably be found in previous versions.




Thank you.

[Attachment #5 (text/html)]

<div dir="ltr">Hello, <div><br></div><div>I attach information about CVE-2013-5572 (Zabbix \
leakage password).</div><div><br></div><div><p class=""><span \
style="font-size:10pt;font-family:&#39;Courier \
New&#39;;color:black">================================================================</span></p>



<p class=""><span style="font-size:10pt;font-family:&#39;Courier New&#39;;color:black">ID: \
CVE-2013-5572</span></p>

<p class=""><span style="font-size:10pt;font-family:&#39;Courier New&#39;;color:black">Title: \
Vulnerability Leak Password Zabbix</span></p>

<p class=""><span style="font-size:10pt;font-family:&#39;Courier New&#39;;color:black">Date: \
23/08/2013</span></p>

<p class=""><span style="font-size:10pt;font-family:&#39;Courier New&#39;;color:black">Status: \
Not Solved</span></p>

<p class=""><span style="font-size:10pt;font-family:&#39;Courier New&#39;;color:black">Scope: \
Privilege Elevation </span></p>

<p class=""><span style="font-size:10pt;font-family:&#39;Courier New&#39;;color:black">Author: \
Chema Alonso, Pablo González, Germán Sánchez</span></p>

<p class=""><span style="font-size:10pt;font-family:&#39;Courier \
New&#39;;color:black">================================================================</span></p>


<p class="" style="text-align:justify"><span style="font-size:10pt;font-family:&#39;Courier \
New&#39;;color:black"> </span></p>

<p class="" style="text-align:justify"><span style="font-size:10pt;font-family:&#39;Courier \
New&#39;;color:black">There is a security bug on Zabbix 2.0.5. This bug allows to see a zabbix \
user’s password, if this user has a open session in management console. Potentially, This
vulnerability allows to carry on an privilege elevation affecting the way
Active Directory resources on Enterprise Network are accessed.</span></p>

<p class="" style="text-align:justify"><span style="font-size:10pt;font-family:&#39;Courier \
New&#39;;color:black"> </span></p>

<p class="" style="text-align:justify"><span style="font-size:10pt;font-family:&#39;Courier \
New&#39;;color:black">About Zabbix</span></p>

<p class="" style="text-align:justify"><span style="font-size:10pt;font-family:&#39;Courier \
New&#39;;color:black">------------</span></p>

<p class="" style="text-align:justify"><span style="font-size:10pt;font-family:&#39;Courier \
New&#39;;color:black"> </span></p>

<p class="" style="text-align:justify"><span style="font-size:10pt;font-family:&#39;Courier \
New&#39;;color:black">From Wikipedia : &quot;Zabbix is a network management system \
application</span></p>

<p class="" style="text-align:justify"><span style="font-size:10pt;font-family:&#39;Courier \
New&#39;;color:black">[...] designed to monitor and track the status of various \
network</span></p>

<p class="" style="text-align:justify"><span style="font-size:10pt;font-family:&#39;Courier \
New&#39;;color:black">services, servers, and other network hardware.&quot;</span></p>

<p class=""><span style="font-size:10pt;font-family:&#39;Courier New&#39;;color:black"> \
</span></p>

<p class=""><span style="font-size:10pt;font-family:&#39;Courier New&#39;;color:black"> \
</span></p>

<p class=""><span style="font-size:10pt;font-family:&#39;Courier \
New&#39;;color:black">Vulnerability description</span></p>

<p class=""><span style="font-size:10pt;font-family:&#39;Courier \
New&#39;;color:black">-------------------------</span></p>

<p class="" style="text-align:justify"><span style="font-size:10pt;font-family:&#39;Courier \
New&#39;;color:red"> </span></p>

<p class="" style="text-align:justify"><span style="font-size:10pt;font-family:&#39;Courier \
New&#39;">First, once the user is able to open a console session in Zabbix, he or she can \
access to the tab (Administration -&gt; Users) where the various users of the system are
displayed.</span></p>

<p class="" style="text-align:justify"><span style="font-size:10pt;font-family:&#39;Courier \
New&#39;"> </span></p>

<p class="" style="text-align:justify"><span style="font-size:10pt;font-family:&#39;Courier \
New&#39;">The user that has been impersonated can view the application source code finding \
there the password that interacts Zabbix, for example with the domain controller.</span></p>

<p class="" style="text-align:justify"><span style="font-size:10pt;font-family:&#39;Courier \
New&#39;"> </span></p>

<p class="" style="text-align:justify"><span style="font-size:10pt;font-family:&#39;Courier \
New&#39;">The field that should be looked for in the source code of the website is type = \
&quot;password&quot; id = &quot;ldap_bind_password&quot; name = &quot;ldap_bind_password&quot; \
value = &lt;password&gt;.</span></p>

<p class="" style="text-align:justify"><span style="font-size:10pt;font-family:&#39;Courier \
New&#39;"> </span></p>

<p class="" style="text-align:justify"><span style="font-size:10pt;font-family:&#39;Courier \
New&#39;">Another option to discover the password supposes that, once the user requests the \
refreshing the web page, the browser asks the user to store or cache the password.</span></p>

<p class="" style="text-align:justify"><span style="font-size:10pt;font-family:&#39;Courier \
New&#39;;color:black"> </span></p>

<p class=""><span style="font-size:10pt;font-family:&#39;Courier New&#39;;color:black">Affected \
versions and platforms</span></p>

<p class=""><span style="font-size:10pt;font-family:&#39;Courier \
New&#39;;color:black">-------------------------------</span></p>

<p class="" style="text-align:justify"><span style="font-size:10pt;font-family:&#39;Courier \
New&#39;;color:black"> </span></p>

<p class="" style="text-align:justify"><span style="font-size:10pt;font-family:&#39;Courier \
New&#39;;color:black">This bug has been verified on the Zabbix 2.0.5. Although the bug can \
probably be found in previous versions.</span></p><p class="" style="text-align:justify"><span \
style="font-size:10pt;font-family:&#39;Courier New&#39;;color:black"><br></span></p><p class="" \
style="text-align:justify"><span style="font-size:10pt;font-family:&#39;Courier \
New&#39;;color:black"><br> </span></p><p class="" style="text-align:justify"><span \
style="font-size:10pt;font-family:&#39;Courier New&#39;;color:black"><br></span></p><p class="" \
style="text-align:justify"><span style="font-size:10pt;font-family:&#39;Courier \
New&#39;;color:black">Thank you.</span></p> </div></div>



_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic