SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   HPE Systems Insight Manager Vendors:   HPE
Compaq Insight Manager Web Agent Session Security Hole May Yield Access to Remote Users
SecurityTracker Alert ID:  1006039
SecurityTracker URL:  http://securitytracker.com/id/1006039
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Feb 3 2003
Impact:   User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  
Version(s): 5.1.0
Description:   A vulnerability was reported in the Compaq Web Agent component of Compaq's Foundation Agents for Windows running on Compaq Proliant Servers. A remote user may be able to gain access to the system by hijacking a recent session.

It is reported that the Compaq Web Agent, used for remote management of Compaq Proliant servers via Secure Sockets Layer (SSL) protected HTTP sessions, contains a session management flaw. A remote user may be able to gain access to an active session. If an authenticated target user closes the browser instead of clicking on the "Logout" link, then a remote user on the same host (or possibly just with the target user's IP address) will reportedly be able to gain access to the target user's session for a period of time (stated to be 15 minutes or less).

According to the report, the Compaq Web Agent can be restarted within the previously referenced period of time without changing the above described behavior. The flaw reportedly lies in the underlying Compaq HTTP Server.

Impact:   In certain situations, a remote user may be able to gain access to a target user's active session. This would allow the remote user to take any action acting as the target user.
Solution:   It is reported that HP has released a fixed version (5.3) of the Compaq HTTP Server. In this version, the session cookie assigned to the user will be wiped out when the target user closes the browser window, so the session cannot be accessed by subsequent users.
Vendor URL:  www.hp.com/ (Links to External Site)
Cause:   Authentication error
Underlying OS:  Windows (2000)
Underlying OS Comments:  Tested on Windows 2000 SP3

Message History:   None.


 Source Message Contents

Subject:  "Compaq Web Agent" management session can be re-used without the need to perform authentication


Suggested Risk Level: Medium (many conditions must be fulfilled to reach
exploit but results can be destructive)



Types of Risk: HTTP SSL session re-use, information disclosure, gain
access and control, manipulation of key management information and
destructive actions (as server reboot).



Affected Hardware / Software:

Server side:
Compaq Web Agent Service 6.0.0.0 using Compaq HTTP Server 5.1.0 on
Windows 2000 Server with SP3

"Compaq Web Agent" related configuration:
Settings -> http server -> options:
Anonymous access: 0
Local Access: 0
Logging: 1 -> Security Error: 1
	     -> Security Information: 1

Client Side:
Internet Explorer 6.0 with SP1 on Windows 2000 Professional with SP3 or
on Windows 95



Local / Remote activated: Local and Remote



Description:

Compaq (Now HP) enables the management and monitoring of its "Proliant"
servers via a secured HTTP session (SSL) from a browser client, either
locally or remotely.

The component that setup and manages this is called "Compaq Web Agent"
and it has its own HTTP server (This agent is installed as a
sub-component of "Foundation agents for windows" component / service).

If a user has completed successfully a login into the "Compaq web agent"
via a legitimate authenticated SSL session - if he closes the session by
closing the browser (which is the regular habit of closing a browser
session) and NOT by clicking the "Logout" link - over the next time(s)
(within a 15 minutes limit) the user (or anyone logged in using the
user's profile from the same client IP address / machine) is opening the
same base URL (i.e. http://<server_name>:2301 (which automatically
redirected into a secured SSL (https) session) - the user is not
presented with the regular login form, but rather the user is entered
directly into the "already logged-in" session, and with the same
privileges that have been granted during the last login.

This behavior is consistent for 15 minutes - which after it looks like
the HTTP server is terminating the session and thus presents the regular
login form.

Reboot of the client machine is not solving this issue.
Restarting the "Compaq Web Agent" or any other Compaq service on the
serving machine did NOT solve this issue.
Only restarting the whole machine of the serving server eliminated the
problem (I guess due to cleanup of the sessions table held by the Compaq
HTTP Server).

I have tried to "steal the session" to be used by another user on the
same machine, by copying cookies and history folders - but this did NOT
succeed.
Maybe someone more skilled about this issues will be able to do it -
this needs to be further looked into.

Just as a test - the same procedures have been tested against an
"Insight Manager 7" (SP 1.2) session - and in this case there was NO
problem and the login form of "Insight Manager 7" was displayed even if
the browser was closed from the browser interface and not using the
"Logout" application link.


An expansion of this issue:
An admin using "Compaq Insight Manager 7" (Proliant servers web based
management application, following "CIM 7") is able to open a "Compaq web
agent" sessions from within CIM 7 if the server browsed is configured to
trust the CIM 7 installation IP address - even if the machine from which
the admin started the browsing to the CIM 7 machine is NOT trusted by
the installation of the specific server running the "Compaq web agent".
The CIM 7 is the one counted as the session origin and thus it is
allowed to be logged in automatically, with no authentication form (CIM
7 is authenticating the admin when he first logs into CIM 7 as a
container).

Now, if the admin performed the above, and then closed the browser
showing CIM 7 (method of closing is not relevant here) - he (or anyone
using its profile from the same IP address within 15 minutes) is able to
get an automatic "already logged-in" session to the "Compaq web agent"
session of the managed server, from his own workstation - even if the IP
address of his workstation is NOT included within the list that limits
the IP addresses allowed to conduct a management session to the server
using the "Compaq Web Agent".

It looks like the HTTP server is still relying on the session opened
from within CIM 7 and somehow it is granting an implied trust over to
the machine of the admin and thus do not perform the source IP address
restriction check.



Possible Abuses:

The web agent enables login using 3 types of pre-defined and built-in
users roles, the most privileged is "Administrator".
"Administrator" can view and change the OS's SNMP configuration, reboot
the remote machine and such.

This vulnerability can be exploited by anyone with access to local OS
session (on the client browser side) that uses the same profile that was
used during the browser session to the web agent, and this within a time
frame of 15 minutes after the closing of the browser (as long as the
server was not rebooted).


Possible scenarios (with either method: direct session to the target
server of re-using the session made via CIM 7 session):

1. An admin who forgot to lock its OS desktop session or log out of his
workstation's / server OS session after closing the browser.

2. An admin who made a web agent browser session from a regular worker's
desktop with that user's profile (since the admin relied on the login
form to re-appear in the next browser session) and simply closed the
browser when he finished his work.

locking the OS desktop session is not possible in windows 95, and
sometime it is even configured not to do a "log out" process (when no
domain login is performed) and can even use a common profile for all the
local users.



Risks:

Maximum risk as Administrator:
1. Change password for the current logged in role
2. Allow anonymous access to the agent session
3. Allow local access (as anonymous or as administrator)
4. Configuring the agent security logging mechanism
5. Configuring the agent allowed source IP addresses restrictions and
trust mode
6. Read, change, add and delete all the OS's SNMP values
7. Reboot of the machine being monitored (if enabled by the agents
configuration) - choosing "reboot to utils" will not boot back to the OS
but rather to the Proliant's boot utilities
8. Manipulate the server management agents and software settings
(including enabling remote access to the server by dial-up, if the
remote utilities and / or hardware is installed)



Exploit Code:
No code is necessary.



Direct resolution:
Not at the moment, Planned by the vendor.


 
Workarounds:

1. Always use the "logout" link from within the web session - This way
any further session will be prompted with the login form.

This solution is efficient but hard to remember to implement since
experienced users tend to close the browser as a whole and not use the
"logout" unique method.
This is especially true when working from within a CIM 7 session that is
not "encouraging" a logout of each server session, but rather encourages
a "flow" of links clicks within the CIM 7 interface envelope.
Also, the version control agent browser session is opened in a new
windows that doesn't have a "logout" link.

2. Don't open "Compaq web agent" or CIM 7 sessions from machines that
are not a formal management / admin machines that are secured
(physically or logically using log out procedures and interface
locking).

3. Remember to make an OS "log out" or interface locking of the machine
from which you did the browser session - to block access to the profile.



Vendor Notification:

The vendor (HP) was notified of this issues and here are the responses:

Regarding the main issue:

"If I understand this correctly, this is known and "as designed".

What I understand this to mean is: I have logged into a web-managed
device, then walk away from the browser WITHOUT LOGGING OUT.  In this
case, any hacker who can physically walk up to my machine (browser
client) within 15 minutes can use my login session.

This is known.  The user is required to logout from the web-managed
device before physically leaving his/her browser machine. Alternatively
to logging out, the user must sit at the machine for 15 minutes while
the session times out, or, in the latest version we are working on,
simply close the browser without logging out (In the latest version of
HP HTTP Server, the session cookie is stored in memory, and dies when
the browser is closed.  I believe IM7 already works like this).

Following the response regarding the expanded issue (no source IP check
is performed if the session is started from CIM 7 and then re-accesses
from the admin's machine), and I think it is not fully answering my
claims:

"Yes.  When a session is created, it is good for 15 minutes unless the
user logs out.  In the latest version (HP HTTP Server 5.3) this is not a
problem as long as the browser is closed. 
Of course the admin could just Logout before physically leaving his/her
browser client."



Credit:
Eitan Caspi
Israel
Email: eitancaspi@yahoo.com
 


Past Security Notes and articles:

1.
http://online.securityfocus.com/bid/4053
http://www.microsoft.com/technet/treeview/default.asp?url=/technet/secur
ity/bulletin/MS02-003.asp
http://support.microsoft.com/default.aspx?scid=KB;en-us;315085&

2.
http://online.securityfocus.com/bid/5972
http://online.securityfocus.com/archive/1/295341
http://support.microsoft.com/default.aspx?scid=kb;en-us;Q329350


3.
http://online.securityfocus.com/bid/6280


You can also find articles I have written in
http://www.themarker.com/eng/archive/one.jhtml (filters: Author = Eitan
Caspi (in the second name set), From year = 1999)



Regards,

Eitan Caspi
Israel



 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC