Vulnerabilities > CVE-2009-1293 - Information Exposure vulnerability in Novell Teaming

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
NONE
Availability impact
NONE
network
low complexity
novell
CWE-200
nessus

Summary

The web login functionality (c/portal/login) in Novell Teaming 1.0 through SP3 (1.0.3) generates different error messages depending on whether the username is valid or invalid, which makes it easier for remote attackers to enumerate usernames.

Vulnerable Configurations

Part Description Count
Application
Novell
7

Common Weakness Enumeration (CWE)

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Subverting Environment Variable Values
    The attacker directly or indirectly modifies environment variables used by or controlling the target software. The attacker's goal is to cause the target software to deviate from its expected operation in a manner that benefits the attacker.
  • Footprinting
    An attacker engages in probing and exploration activity to identify constituents and properties of the target. Footprinting is a general term to describe a variety of information gathering techniques, often used by attackers in preparation for some attack. It consists of using tools to learn as much as possible about the composition, configuration, and security mechanisms of the targeted application, system or network. Information that might be collected during a footprinting effort could include open ports, applications and their versions, network topology, and similar information. While footprinting is not intended to be damaging (although certain activities, such as network scans, can sometimes cause disruptions to vulnerable applications inadvertently) it may often pave the way for more damaging attacks.
  • Exploiting Trust in Client (aka Make the Client Invisible)
    An attack of this type exploits a programs' vulnerabilities in client/server communication channel authentication and data integrity. It leverages the implicit trust a server places in the client, or more importantly, that which the server believes is the client. An attacker executes this type of attack by placing themselves in the communication channel between client and server such that communication directly to the server is possible where the server believes it is communicating only with a valid client. There are numerous variations of this type of attack.
  • Browser Fingerprinting
    An attacker carefully crafts small snippets of Java Script to efficiently detect the type of browser the potential victim is using. Many web-based attacks need prior knowledge of the web browser including the version of browser to ensure successful exploitation of a vulnerability. Having this knowledge allows an attacker to target the victim with attacks that specifically exploit known or zero day weaknesses in the type and version of the browser used by the victim. Automating this process via Java Script as a part of the same delivery system used to exploit the browser is considered more efficient as the attacker can supply a browser fingerprinting method and integrate it with exploit code, all contained in Java Script and in response to the same web page request by the browser.
  • Session Credential Falsification through Prediction
    This attack targets predictable session ID in order to gain privileges. The attacker can predict the session ID used during a transaction to perform spoofing and session hijacking.

Nessus

NASL familyCGI abuses
NASL idNOVELL_TEAMING_USER_ENUMERATION.NASL
descriptionThe remote host is running Novell Teaming, a collaboration and conferencing application. The version of Novell Teaming installed on the remote host allows an unauthenticated remote attacker to enumerate users during the login phase because the web application responds with different messages when an invalid username or invalid password is used. In addition, it is likely to be affected by multiple cross-site scripting vulnerabilities due to its failure to sanitize input to the
last seen2020-06-01
modified2020-06-02
plugin id36205
published2009-04-21
reporterThis script is Copyright (C) 2009-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/36205
titleNovell Teaming Login User Account Enumeration Weakness
code
#
# (C) Tenable Network Security, Inc.
#


include("compat.inc");

if (description)
{
  script_id(36205);
  script_version("1.13");

  script_cve_id("CVE-2009-1293");
  script_bugtraq_id(34531);
  script_xref(name:"Secunia", value:"34714");

  script_name(english:"Novell Teaming Login User Account Enumeration Weakness");
  script_summary(english:"Queries several user accounts");

  script_set_attribute(attribute:"synopsis", value:
"The remote web server contains a module that leaks information." );
  script_set_attribute(attribute:"description", value:
"The remote host is running Novell Teaming, a collaboration and
conferencing application.  The version of Novell Teaming installed on
the remote host allows an unauthenticated remote attacker to enumerate
users during the login phase because the web application responds with
different messages when an invalid username or invalid password is
used. 

In addition, it is likely to be affected by multiple cross-site
scripting vulnerabilities due to its failure to sanitize input to the
'p_p_state' and 'p_p_mode' parameters of the web application, although
Nessus has not checked for these.");

  script_set_attribute(attribute:"see_also", value:"https://www.securityfocus.com/archive/1/502704/30/0/threaded" );
  # http://www.novell.com/support/kb/doc.php?id=7002997
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?05eaae82" );
  # http://www.novell.com/support/kb/doc.php?id=7002999
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?a9e444a0" );
  script_set_attribute(attribute:"solution", value:
"Apply the appropriate patch referenced in the vendor advisory above." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N");
 script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"true");
 script_cwe_id(200);

 script_set_attribute(attribute:"plugin_publication_date", value: "2009/04/21");
 script_set_attribute(attribute:"patch_publication_date", value: "2009/04/14");
 script_cvs_date("Date: 2018/11/15 20:50:18");
  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"exploited_by_nessus", value:"true");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"CGI abuses");

  script_copyright(english:"This script is Copyright (C) 2009-2018 Tenable Network Security, Inc.");

  script_dependencies("http_version.nasl");
  script_exclude_keys("Settings/disable_cgi_scanning");
  script_require_ports("Services/www", 80);

  exit(0);
}

include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

port = get_http_port(default:80, embedded: 0);

users = make_list(
  string("nessus-", unixtime()),     # hopefully bogus
  "admin",                           # hopefully good
  "guest"                            # ??
);

password = string("nessus-", unixtime());


# Loop through directories.
if (thorough_tests) dirs = list_uniq(make_list("/teaming", cgi_dirs()));
else dirs = make_list(cgi_dirs());

foreach dir (dirs)
{
  errors = make_array();
  user_existent = NULL;
  user_nonexistent = NULL;
  password_var = NULL;
  url = string(dir, "/c/portal/login");

  # We have to determine the value of the password variable from the initial connection
  res = http_send_recv3(method:"GET", item:url, port:port);
  if (isnull(res)) exit(0);
  if ("<title>Novell Teaming" >!< res[2]) break;

  if ("_password" >< res[2]){
    matches = eregmatch(pattern:'<input name="([A-Za-z]+_password)"', string:res[2]);
    password_var = matches[1];
  }

  foreach user (users)
  {
    postdata = string(
      "cmd=already-registered", "&",
      "tabs1=already-registered", "&",
      "rememberMe=false","&",
      "login=", user, "&",
      password_var, "=", password
    );
    res = http_send_recv3(method:"POST", data:postdata, add_headers:make_array("Content-Type", "application/x-www-form-urlencoded"), item:url, port:port);
    if (isnull(res)) exit(0);

    if (isnull(user_nonexistent) && "Please enter a valid login." >< res[2])
    {
      user_nonexistent = user;
      error = strstr(res[2], "Please enter a valid login.");
      errors[user] = error - strstr(error, "</span>");
    }
    else if (
      isnull(user_existent) && "Authentication failed. Please try again." >< res[2])
    {
      user_existent = user;
      error = strstr(res[2], "Authentication failed. Please try again.");
      errors[user] = error - strstr(error, "</span>");
    }

    if (user_existent && user_nonexistent)
    {
      set_kb_item(name: 'www/'+port+'/XSS', value: TRUE);
      if (report_verbosity > 0)
      {
        report = string(
          "\n",
          "Nessus was able to verify the issue with the following queries and\n",
          "responses :\n",
          "  Existing User  : ", user_existent, "\n",
          "  URL            : ", build_url(port:port, qs:url), "\n",
          "  Response Error : ", errors[user_existent], "\n",
          "\n",
          "  Invalid User   : ", user_nonexistent, "\n",
          "  URL            : ", build_url(port:port, qs:url), "\n",
          "  Response Error : ", errors[user_nonexistent], "\n"
        );
        security_warning(port:port, extra:report);
      }
      else security_warning(port);

      exit(0);
    }
  }
}

Seebug

bulletinFamilyexploit
descriptionBUGTRAQ ID: 34531 CVE(CAN) ID: CVE-2009-1294,CVE-2009-1293 Novell Teaming是专为团队协同作业而设计的解决方案,内含各种企业社区网络与工作流程功能。 Novell Teaming通过以下登录表单执行用户认证: https://teaming.example.com/c/portal/login 对于有效的和无效的用户名,Web应用会返回不同的响应(Please enter a valid login/Auhtentication failed),这就允许攻击者通过字典或暴力猜测攻击推测出是否存在特定的用户名。 Novell Teaming没有正确地验证或转义p_p_state和p_p_mode参数,远程攻击者可以通过提交恶意请求执行跨站脚本攻击。 Novell Teaming 1.0.3 Novell ------ 目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: <a href=http://support.novell.com/security-alerts target=_blank rel=external nofollow>http://support.novell.com/security-alerts</a>
idSSV:5059
last seen2017-11-19
modified2009-04-16
published2009-04-16
reporterRoot
sourcehttps://www.seebug.org/vuldb/ssvid-5059
titleNovell Teaming用户枚举和跨站脚本漏洞