exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

OpManager 12100 / 12200 Cross Site Scripting / Denial Of Service

OpManager 12100 / 12200 Cross Site Scripting / Denial Of Service
Posted Nov 20, 2016
Authored by Michael Heydon

OpManager versions 12100 and 12200 suffer from multiple cross site scripting and denial of service vulnerabilities.

tags | exploit, denial of service, vulnerability, xss
SHA-256 | 99984d22fa49da1ec9dac4681534c19f8f0e001513097de58ac9cc8947841833

OpManager 12100 / 12200 Cross Site Scripting / Denial Of Service

Change Mirror Download
Title: Multiple issues in OpManager
Author: Michael Heydon
Product: OpManager
Tested Versions: 12100 & 12200
Vendor: Zoho ManageEngine
Vendor Notified: 2016-08-14
Disclosure Date: 2016-11-20

Product Description:
====================
OpManager is a web-based network monitoring system. It is used primarily by
IT staff and it stores credentials in order to log in to systems which are
to be monitored. According to ManageEngine it is "Trusted by over a Million
administrators worldwide".


*******************************************************************************

Issue: DoS
======

Description
===========
The EncryptPassword API is susceptible to a denial of service attack. When
certain characters are in the EncryptPassword value the server process will
go into an infinite loop.

This is caused by the use of a "while (1) {search; if (found) break}"
algorithm in the baseConvertor function. An input value that is not present
within the lookup table will cause the function to loop indefinitely.

By sending a relatively small number of these requests the service can be
overloaded (in testing approx. 500 requests will make OpManager practically
unresponsive until someone logs in to the server and restarts the service).

Steps to Reproduce
==================
wget -O /dev/null --quiet --post-data='EncryptPassword=%10' http://opmanagerurl.example.com/servlets/SettingsServlet?requestType=AJAX

Notes
=====
This could be used to disrupt monitoring infrastructure while an attack is
in progress against a monitored system.

A similar algorithm is used in the baseDeconvertor function used to
"decrypt" passwords. Consequently it is likely that a similar issue can be
triggered by attempting to log in with a specially crafted cookie set
however this has not been tested.

*******************************************************************************

Issue: Stored XSS
======

Description
===========
The User Defined DNS Names table in System Settings -> DNS fails to sanitize
user input.

Steps to Reproduce
==================
Log in to OpManager as an administrator. Browse to the DNS settings page.

Add an entry with the following data:
IP Address: 1.2.3.4
DNS Name: <script>alert('XSS');</script>example.com

Any user browsing to the DNS settings page will receive an alert.

*******************************************************************************

Issue: Reflected XSS
======

Description
===========
The ping and traceroute buttons on the MonitoringDevice page fail to sanitize the name of the host being monitored.

Steps to Reproduce
==================
Browse to:
http://opmanagerurl.example.net/apiclient/ember/index.jsp#/Inventory/Snapshot/MonitoringDevice/xssdemo%3Cscript%3Ealert(%22XSS%22)%3B%3C%2Fscript%3E

Click on either the Ping or Traceroute buttons.

You will receive an alert.

Notes
=====
As the specified device does not exist, the page does not render correctly.
This makes it less likely that the attacker will be able to convince the
victim to click on the buttons.

*******************************************************************************

Issue: Reflected XSS
======

Description
===========
The packet loss graph and response time graph pages fail to adequately
sanitize the name of the host being monitored.

This issue has been partially mitigated in version 12200. The original non-
interactive examples no longer work, however XSS is still possible with user
interaction.

Steps to Reproduce (v12100)
===========================
Browse to:
http://opmanagerurl.example.com/apiclient/ember/index.jsp#/Inventory/Snapshot/MonitoringDevice/A')"%20onfocus=alert('XSS');%20autofocus%20x='/PerfGraph/packetLoss/packetLoss
or
http://opmanagerurl.example.com/apiclient/ember/index.jsp#/Inventory/Snapshot/MonitoringDevice/A')"%20onfocus=alert('XSS');%20autofocus%20x='/PerfGraph/responseTime/responseTime

You will receive an alert.

Notes (v12100)
==============
As this exploit is triggered by an "onfocus" event and generates an alert
(which takes focus when it opens and returns focus when it is closed) these
examples will continually generate alerts.

Steps to Reproduce (12200)
===========================
Browse to:
http://opmanagerurl.example.com/apiclient/ember/index.jsp#/Inventory/Snapshot/MonitoringDevice/A');%20alert('XSS');nop('/PerfGraph/packetLoss/packetLoss
or
http://opmanagerurl.example.com/apiclient/ember/index.jsp#/Inventory/Snapshot/MonitoringDevice/A');%20alert('XSS');nop('/PerfGraph/responseTime/responseTime

Click on any of the fixed Time Period buttons.

You will receive an alert.

Notes (v12200)
==============
Under 12200 this exploit presents a similar risk to the ping/traceroute
issue. It requires the victim to click on a malformed page and it is
therefore somewhat harder for an attacker to convince the victim to trigger
the payload.

*******************************************************************************

Issue: Insecure Storage of User Credentials
=====

Description
===========
When the "Keep me signed in" checkbox on the login page is ticked, the
user's password is saved in a cookie in (obfuscated) plaintext.

Steps to Reproduce
==================
Log in to OpManager with the "Keep me signed in" checkbox selected. Inspect
cookies. The "encryptPassForAutomaticSignin" value contains the user's
password obfuscated using a caesar shift and a form of base59 encoding.

Javascript code to read and decode the login cookies can be found at:
https://mheydon.net/Projects/Security/OpManager/ompw-js.txt

Notes
=====
The cookie is not HTTPOnly.

*******************************************************************************

Disclosure Timeline
====================
2016-08-15 - Reported to ManageEngine (ME)
2016-08-17 - Received acknowledgement
2016-09-17 - Requested status update
2016-09-17 - Received reply that fixes were underway, suggested "12100
consolidated fix"
2016-09-19 - Sent clarification that testing was against 12100. Requested
link to consolidated fix
2016-09-20 - Received link for 12000 to 12100 update
2016-09-20 - Advised that the linked patch would not install, repeated that
testing was against 12100
2016-09-20 - Received link to NCM/NF patch
2016-09-20 - Tested & informed ME that patch does not resolve any issues
2016-11-15 - OpManager 12200 released.
2016-11-18 - Retested & contacted ME confirming that Performance Graph XSS
is harder to trigger, but otherwise all issues remain in latest
version. Reminded ME that 90 days had passed and that details
would be made public.
2016-11-18 - Received acknowledgement
2016-11-20 - Public disclosure
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close