what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Dell Quest One Password Manager CAPTCHA Bypass

Dell Quest One Password Manager CAPTCHA Bypass
Posted Oct 21, 2013
Authored by Johnny Bravo

The Quest One Password Manager simply fails to check the CAPTCHA submitted if the values do not accompany the payload.

tags | exploit
SHA-256 | 313d269064ddfbfb5e73fe5e9e030996a25bafd0370abddea445ea7aa3963b9a

Dell Quest One Password Manager CAPTCHA Bypass

Change Mirror Download
-= [ Disclosure ]=-
Filing Date: Today
Issue Tracking Numbah: 20747
Discoverorer: Johnny Bravo

-=[ Background ]=-
Quest made a password management web thing. Dell bought Quest. Dell
offers Quest One(tm) Password Manager for $5/user.
http://software.dell.com/products/password-manager/. (Oddly, this is
not a joke.)

-=[ Issue ]=-
To use the web application you need to know your domain, username, and
the value of the presented captcha. You submit that, correctly, and the
web application will present you with the user's full name and some
options.

Today we will just talk about that bit there. You do not need to
actually know the value of the captcha. Someone who is really bored
could easily enumerate logins and match them to a user's name.

-=[ Attack ]=-
On the POST request you can just remove the captcha bits. Pretty
fucking l33t. This is the kind of thing that HFG would produce. Or
maybe Gobbles. Or, more likely, se7en. And no, I didn't find this in
the "Snowden docs" although this may be an NSA backdoor... you decide!

On to the attack. The POST data normally includes the following
parameters:
ScenarioActionId=42696720-7368-6974-2070-726F64756374&UserName=domain%5Cu

ser&Search=false&CaptchaType=Captcha&UseCaptchaEveryTime=True&CaptchaResp

onse=SelfCleaningVagina

l33t hackers would send these parameters:
ScenarioActionId=42696720-7368-6974-2070-726F64756374&UserName=domain%5Cu

ser&Search=false

-=[ Fix ]=-
(This section is for the developers who wrote the software)
Write the code such that, oh, I don't know, it actually checks to
ensure the fucking captcha is used? Someone did this on one of the
other pages in the app. Perhaps use the code from there? If it's not
too much to ask that is.

(This section is for product owners)
Really, you bought this? Really? Really? Really?

(This section is for users)
Yes, that's right, any moron on the internets can discover your company
login id and pair that with your name if you work at a place
unfortunate enough to utilize this product. If your company doesn't
have resources to create this app themselves, they've probably
outsourced your helpdesk too, which means you're about to get pwn3d via
some fairly lame social engineering. Enjoy that.

-=[ Greetz ]=-
Dell, Quest, and the security company that either uses this shit
internally or resells it, or uses it and resells it.

Brought to youse guys by,
Johnny, Johnny Bravo

PS If you haven't seen my tips on picking up the chicks, check it out
on the youtube http://www.youtube.com/watch?v=xnGnl-UElVA.


Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close