Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Security)  >   Netcool/NeuSecure Vendors:   Micromuse
Netcool/NeuSecure Discloses Passwords to Local Users
SecurityTracker Alert ID:  1015642
SecurityTracker URL:
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Feb 17 2006
Impact:   Disclosure of authentication information
Exploit Included:  Yes  
Version(s): 3.0.236-1
Description:   A vulnerability was reported in Netcool/NeuSecure. A local user can obtain passwords.

The system stores passwords in clear text in the configuration file. A local user can view the passwords, as this file is world readable.

The system writes the password for the database user account to a log file (/opt/NeuSecure/./bin/ns_archiver.log). A local user can view the file to obtain the password and connect to the database. Then, the user may be able to access usernames and passwords from the 'auth' table.

The vendor was notified on February 3, 2006.

Dimitry Snezhkov reported this vulnerability.

Impact:   A local user can obtain passwords.
Solution:   No solution was available at the time of this entry.
Vendor URL: (Links to External Site)
Cause:   Access control error, Configuration error
Underlying OS:  Linux (Red Hat Enterprise), UNIX (Solaris - SunOS)

Message History:   None.

 Source Message Contents

Subject:  [Full-disclosure] Password disclosure and remote access in

Multiple security information disclosure paths and remote access
Netcool/NeuSecure Security information management platform .

Cleartext-storage of passwords in the configuration file
Cleartext reporting of user password in the log
Default backend Mysql database user  and remote access.
Laxed  filesystem permissions and  id/password leak.

Netcool/NeuSecure is a security information management (SIM) platform
designed to improve the effectiveness, efficiency and visibility of
security operations and information risk management. The solution
centralizes and stores security data from throughout the enterprise,
automating incident recognition and response, streamlining incident
handling, enabling policy monitoring enforcement and providing
comprehensive reporting for regulatory compliance. The centralization
and automation of these functions results in reduced costs of security
and IT operations


		Vendor communication history.

Feb 3  contacted asking to log a support call.
 	was promptly  redirected to
Feb 3  email explaining vulnerability sent to
Prompt automated
Feb 3  Ticket is opened with tag: Insufficient customer information.
Need customer id,
	support contract  number and environment description.
	Due to the nature of this independent research, such
        information is not available or cannot be provided to the support.
Feb 3  Second request for customer information in order to
successfully log the issue.
	I stated one more time that any technical, non-customer related information
	can and will be provided.
Feb 6  Third request for customer information. And once more, I
explained the situation
	willing to give any information not pertaining to the customer.
Ticket is downgraded
	to lower priority.
Feb 16 Ticket is apparently closed. Disclosing to  the list.


Platform : RedHat EL 3

1. Default build  has laxed  directory permissions which may lead to
a regular user viewing configuration files containing passwords.

-rw-r--r--    1 ns       ns           1228 Feb  3 10:25 /etc/neusecure.conf
drwxr-xr-x   15 ns       ns           4096 Dec  1 12:43 /opt/NeuSecure
drwxr-xr-x    2 ns       ns           4096 Jan  9 21:42 /opt/NeuSecure/etc/
-rw-r--r--    1 ns       ns           1334 Nov 16 18:44

2.  Cleartext-storage of passwords in the configuration file

# JReports Config Variables #

3. Cleartext reporting of  the <ns> user password in the log  viewable
by an unprivileged user which leads to direct mysql database
connection and authentication with possibility to dump users and
passwords  from  the 'auth' table:

-rw-rw-r--    1 ns       ns           5102 Jan  9 12:17

Building NSSQLConnection "CMS Connection" type = mysql name = nsdbp
[1136830628.351]NSSQLConnection::NSSQLConnection => building mysql
connection to: hostString = "/tmp/mysql.sock@nsdbp" user = "ns" pass =
[1136830628.356]connected successfully!
[1136830628.356]Connected using UNIX socket:/tmp/mysql.sock


trivial to connect to backend ....

   Unfortunately, you cannot avoid storing cleartext passwords by
changing configuration
   options. This should be reworked by the vendor.
   Default password can be changed, but is still cleartext in the
configuration file.

1. Secure permissions to the password file to avoid unprivileged users
 reading the file.
2. Redirect log  storage to secure place,  secure access permissions.
3. Change access permissions on the database

Dimitry Snezhkov.
Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia -


Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, LLC