what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

JDA Connect CSRF / Command Execution / Exposed JMX Service

JDA Connect CSRF / Command Execution / Exposed JMX Service
Posted May 28, 2018
Authored by Xiaoran Wang

JDA Connect suffers from cross site request forgery, JMX interface exposure, and command execution vulnerabilities.

tags | exploit, vulnerability, csrf
SHA-256 | 9208639b230a277236982d9d21e65b17c68509bc2d0a40672ac22f324f504dfb

JDA Connect CSRF / Command Execution / Exposed JMX Service

Change Mirror Download
Introduction
============
Multiple critical vulnerabilities were identified in JDA Connect.
The vulnerabilities were discovered during a
black box security assessment and therefore the vulnerability list
should not be considered exhaustive.

Affected Software and Versions
==============================
- Tested with JDA Connect (most recent version at the date of July 2017)
- All vulnerabilities are fixed as of patch 2017.2

CVE
===
No CVEs have been assigned yet.

Author
======
The vulnerabilities were discovered by Xiaoran Wang from Google Security
Team.

Credit
======
The author would like to thank John Vrankovich from JDA for coordinating
the security fixes promptly and diligently.

Vulnerability Overview
======================
CNT-01 - Privileged remote command execution through open CORS policies
CNT-02 - No CSRF protection on hawtio web portal
CNT-03 - Unauthenticated JMX service listening on all interfaces


Vulnerability Details
=====================
----------------------------------------------------------------------------
CNT-01 - Privileged remote command execution through open CORS policies
----------------------------------------------------------------------------
Severity: CRITICAL

The hawtio admin web portal running on port 8181 has a insecure wide open
aAccess-Control-Allow-Origina setting and it allows any arbitrary origin to
access its data by echoing back aAccess-Control-Allow-Origin:
attacker-supplied-origina and aAccess-Control-Allow-Credentials: truea.
This allows the attacker to communicate with the vulnerable website from an
attackeras website as if they were on the same origin. This enables the
attacker to take send and receive any request this website accepts because
itas cookie authenticated. Example requests include dumping heap memory,
reading/writing JVM options, reading/writing object values, installing
arbitrary features/bundles, and the servlet handler runs as root.

----------------------------------------------------------------------------
CNT-02 - No CSRF protection on hawtio web portal
----------------------------------------------------------------------------
Severity: HIGH

The hawtio admin web portal running on port 8181 does not have any CSRF
protection, leading to the same results as the previous vulnerability, such
as installing arbitrary packages, reading/writing JVM memory, etc.

----------------------------------------------------------------------------
CNT-03 - Unauthenticated JMX service listening on all interfaces
----------------------------------------------------------------------------
Severity: HIGH

The JDA Connect Java daemon has a JMX server that listens on all interfaces
without authentication. Using tools like jconsole, one could read and write
the values of objects in the entire application, possibly leading to
arbitrary command execution. For example, the Java process is started with
the following options.
-Dcom.sun.management.jmxremote.port=1616
-Dcom.sun.management.jmxremote.authenticate=false
-Dcom.sun.management.jmxremote.ssl=false


Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    0 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close