exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

nmrc.01-11-27.netdynamics

nmrc.01-11-27.netdynamics
Posted Nov 26, 2001
Authored by Phuzzy L0gic | Site nmrc.org

NMRC Advisory - A vulnerability has been found in Sun's NetDymanics session management package that allows an attacker to hijack random user sessions. Versions confirmed affected include Solaris 7 and 8 (SPARC), running NetDynamics 4.x and 5.x.

systems | solaris
SHA-256 | 93ca5cbfd649dcedcb26f1045e072b2faba1a2aa28bf1d75267c53805c5bb86d

nmrc.01-11-27.netdynamics

Change Mirror Download
_______________________________________________________________________________

I N F O R M A T I O N A N A R C H Y 2 K 0 1
www.nmrc.org/InfoAnarchy


Nomad Mobile Research Centre
A D V I S O R Y
www.nmrc.org
Phuzzy L0gic [phzy@nmrc.org]
27Nov2001

_______________________________________________________________________________

Platform : Sun Solaris Version 7, 8
Application : NetDynamics 4.x, 5.x
Severity : Medium


Synopsis
--------

It appears that the NetDynamics session management package does not
properly manage its user state table. The previously generated session ID
to that of a legitimate logged in user remains valid for that account for
upwards of 15 seconds after login.

Therefore it is possible for an attacker with understanding of the web
application's command mappings to hijack random user sessions.

Tested configuration
--------------------

Testing was done with the following configuration :

Sun Solaris 7 (SPARC)
Sun Solaris 8 (SPARC)
NetDynamics 4.x
NetDynamics 5.x

Other versions and platforms were not tested but it is assumed
that they are also vulnerable.

Problem(s) Reported
-------------------

This attack can be carried out in the following manner:

An attacker visits the web application's login page where ndcgi.exe
generates a 'random' session ID to sample the hidden 'SPIDERSESSION'
tag as well as the 'uniqueValue' tag out of the html source.

The attacker must then wait for a legitimate user to login.

Append both variables to the end of a command request (URL will be wrapped):

"http://victim/cgi-bin/ndcgi.exe/[command>mapping]/[command]?SPIDERSESSION=
[...]&uniqueValue=XXXXXXXXXXXXX"

The command is executed with the privileges of the victim, and the
attacker now controls the session.

If NetDynamics is configured to allow multiple logins from any domain
(default), the victim will not be alerted to the attack.


Solution/Workaround
-------------------

None available -- Sun (http://www.sun.com) was contacted but no response
was ever received.

Perhaps configuring NetDynamics to not allow multiple logins from the same
domain will help alert to such an attack being carried out.


Comments/Theory
---------------

We attempted to contact Sun regarding this issue several times going as
far back as our initial contact on November 9th. Needless to say, that we
have received no response to any of our emails, therefore NMRC should not
be held liable for any inconsistencies within this report as a result
thereof.

As per the NMRC disclosure policy, http://www.nmrc.org/advise/policy.txt
we have released this advisory without the vendor information.

This issue was discovered and tested by Phuzzy L0gic of NMRC and has been
released in support of Information Anarchy 2K01 - www.nmrc.org/InfoAnarchy


_______________________________________________________________________________

Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close