exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Sony Playstation Network Password Reset

Sony Playstation Network Password Reset
Posted Jun 28, 2013
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

A critical password reset (session) vulnerability was detected in the Sony PSN Network web server auth system account application. The vulnerability allows remote attackers without a privileged application account to exchange session values and reset any psn user accounts.

tags | advisory, remote, web
SHA-256 | 7d2f60f06b1f589958b985c9d294460f3f3b1163bb51e8e1a6e79d4d54e5a3ba

Sony Playstation Network Password Reset

Change Mirror Download
Title:
======
Sony Playstation Network Account Service System - Password Reset (Session) Vulnerability


Date:
=====
2013-05-12


References:
===========
http://www.vulnerability-lab.com/get_content.php?id=740


VL-ID:
=====
740


Common Vulnerability Scoring System:
====================================
9.3


Introduction:
=============
PlayStation Network, often abbreviated as PSN, is an online multiplayer gaming and digital media delivery service provided/run
by Sony Computer Entertainment for use with the PlayStation 3, PlayStation Portable, and PlayStation Vita video game consoles.
The PlayStation Network is the video game portion of the Sony Entertainment Network.

(Copy of the Homepage: http://en.wikipedia.org/wiki/PlayStation_Network)


Abstract:
=========
The Vulnerability Laboratory Research Team discovered a critical remote web vulnerability in the official PSN Network Accounting Service (PS).


Report-Timeline:
================
2012-11-04: Researcher Notification & Coordination
2012-11-06: Vendor Notification 1
2012-12-03: Vendor Notification 2
2013-01-15: Vendor Notification 3
2012-05-01: Vendor Fix/Patch by Check
2012-05-12: Public Disclosure (full 2013-06-28)


Status:
========
Published


Affected Products:
==================
Sony
Product: Playstation Network - Account Service 2012 Q3


Exploitation-Technique:
=======================
Remote


Severity:
=========
Critical


Details:
========
A critical Password Reset (Session) vulnerability is detected in the Sony PSN Network Web Server Auth System Account Application.
The vulnerability allows remote attackers without privileged application account to exchange session values and reset any psn user accounts.

The critical application vulnerability is located in the recovery (forgot password) account function of the psn account service application.
In the recovery function is an auth request bound to the account session using the allowed password forgot (method 3) form via JSon & jquery
with the value of the intercape. The request itself is not sanitized when reseting via medthod 3 only 1 value (Forgot Your Password)
by processing to load it two times (https://store.playstation.com/accounts/manage/beginPasswordResetFlow.action) and live changing the manipulated
request at the end when process to hold the request. The value only checks if exist and if empty but not validate the context again (2nd time).
The attacker can bypass the token protection via live session tamper to reset any psn account by exchanging the values local to his own.
Exploitation requires `processing to request` via for example the JSon form and jquery request. It is also required to know the birthdate of the
account because of the protection mechanism at the end.

Since yet it is only manually possible to exploit the remote vulnerability by using a session tamper tools (remote) like tamper data. A remote
attacker can, for example bypass the token protection with values like “*/+[New Account Details] or [New Account Details]+/*“ to reset random
psn application accounts or infiltrate specific choosen accounts by changing the password with own email of another user. The problem is the
not specified recheck of the `Forgot Your Password` request values.

Exploitation of the vulnerability requires no application user account and also no user interaction. Successful exploitation of the critical remote
vulnerability result in psn account compromise, psn account infiltration, account information disclosure or lead to psn user account manipulation.


Vulnerable Service(s):
[+] PSN Network - Auth Service - http://de.playstation.com/sign-in/

Vulnerable Section(s):
[+] Account Application Service - https://secure.eu.playstation.com/sign-in/

Vulnerable Module(s):
[+] Recovery Function - https://store.playstation.com/accounts/manage/beginPasswordResetFlow.action

Affected Module(s):
[+] JSon, JQuery & Session


Proof of Concept:
=================
The vulnerability can be exploited by remote attackers without application user account and without required user interaction.
For demonstration or reproduce ...


Required for Exploitation:
[+] Tamper Data or other live tamper software
[+] Web Browser like mozilla firefox, opera and co.
[+] A random pession website application session which is not expired in any way

Exploitation Techique(s):
[+] Bypass the PSN Recovery Page (request tamper) to new Pass (use both forgotten) to Reset
[+] Bypass token protection via not empty value(s) with positiv value(s) + \ to match when processing to request via json
[+] Hold the request via tamper include own values to setup the new password in the form of the forgotten password post inputs
[+] Check the postbox of the secound ending reset to get the link and include the birthdate of the first account
[+] Reset the password to your own new values

Next Step(s):
[+] Decode captcha & send automatique value(s) -> Account Service (Remote Exploit)

Reference(s):
[+] Playstation.com/accounts/manage/beginPasswordResetFlow.action

Note:
The first request need to be stoped and tampered when processing to send the bound recovery post request.
In the secound step the stoped request with the same values needs to be send together to reset the other accounts first valid request.


URL(s):
https://account.sonyentertainmentnetwork.com/pc/reg/account/forgot-password!input.action?service-entity=psn
https://cdn-a.sonyentertainmentnetwork.com/grc/js/jquery.preload-1.0.8-min.js
https://cdn-a.sonyentertainmentnetwork.com/grc/unifiedFooter/footerJSONHTML.min.js
https://cdn-a.sonyentertainmentnetwork.com/grc/unifiedFooter/DE/de/JSONUnifiedFooter.js



Session: Live 2012-11-01 (DE)- (19:22 - 20:10)


Solution:
=========
2012-05-01: Vendor Fix/Patch by Check


Risk:
=====
The security risk of the password reset web session vulnerability is estimated as critical.


Credits:
========
Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri (bkm@vulnerability-lab.com)


Disclaimer:
===========
The information provided in this advisory is provided as it is without any warranty. Vulnerability-Lab disclaims all warranties,
either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-
Lab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business
profits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some
states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation
may not apply. We do not approve or encourage anybody to break any vendor licenses, policies, deface websites, hack into databases
or trade with fraud/stolen material.

Domains: www.vulnerability-lab.com - www.vuln-lab.com - www.vulnerability-lab.com/register
Contact: admin@vulnerability-lab.com - support@vulnerability-lab.com - research@vulnerability-lab.com
Section: video.vulnerability-lab.com - forum.vulnerability-lab.com - news.vulnerability-lab.com
Social: twitter.com/#!/vuln_lab - facebook.com/VulnerabilityLab - youtube.com/user/vulnerability0lab
Feeds: vulnerability-lab.com/rss/rss.php - vulnerability-lab.com/rss/rss_upcoming.php - vulnerability-lab.com/rss/rss_news.php

Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory.
Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other
media, are reserved by Vulnerability-Lab Research Team or its suppliers. All pictures, texts, advisories, source code, videos and
other information on this website is trademark of vulnerability-lab team & the specific authors or managers. To record, list (feed),
modify, use or edit our material contact (admin@vulnerability-lab.com or support@vulnerability-lab.com) to get a permission.

Copyright © 2013 | Vulnerability Laboratory




--
VULNERABILITY LABORATORY RESEARCH TEAM
DOMAIN: www.vulnerability-lab.com
CONTACT: research@vulnerability-lab.com

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close