exploit the possibilities

Brava! Enterprise / Server 16.4 Information Disclosure

Brava! Enterprise / Server 16.4 Information Disclosure
Posted Nov 1, 2018
Authored by Luke Bailiff

Brava! Enterprise and Server components versions 7.5 through 16.4 suffer from a sensitive data exposure vulnerability due to weak permissions.

tags | exploit, info disclosure
MD5 | d8b086c6d8399f7021b016ba9a5f9d1d

Brava! Enterprise / Server 16.4 Information Disclosure

Change Mirror Download
Vulnerable Application:  Brava! Enterprise and Brava! Server Components

Affected Versions: Brava! Enterprise and Brava! Server Components have this as the default configuration, from Brava! 7.5 to the latest Brava! 16.4 on Windows.

Not Affected Versions: Linux installs do not automatically create the share.

Potential Security Impact: Sensitive Data Exposure

If the files within your implementation are sensitive, this may expose sensitive data to unauthorized users. Limiting SMB access will help mitigate this vulnerability as well.

Since the default permissions allow for modify access of the files, there is some potential against the integrity of the file as the user is viewing it, but this has not been explored.


Vulnerability Description: During the installation of Brava! Enterprise and Brava! Server Components, a file share is created on the windows server called "displaylistcache" with full read and write permissions for the everyone group at both the NTFS and Share levels. The share is used to retrieve documents for processing, and to store processed documents for display in the browser. This is the default behavior of the install. The only required share level access is read/write by the JobProcessor service account. At the local filesystem level, the only additional required permissions would be read/write from the servlet engine (typically Tomcat). The affected server components are not installed with Content Server by default, and must be installed separately.


Remediation: Review your OpenText install to see if you are affected. If affected, update permissions on the displaylistcache share and local level to allow only the servlet engine (typically tomcat) and the JobProcessor service accounts access.

Vendor declined to update the installer behavior, but has updated their documentation.

Vendor comment:
Our default Brava! Enterprise/Brava! Server Components installer is intended to be used as a starting point for implementation within your environment. We do provide guidelines within our documentation on how to harden the Brava! Enterprise web application/server and expect that the documentation be reviewed during installation and configuration. Our documentation does include information on the requirements of the displaylistcache share, but because each customer will have different infrastructure-based considerations, which would be overwhelming to thoroughly document, we only offer general guidance. We continually evaluate our documentation over time and lately have updated our "Security Considerations" documentation to add more clarity around the requirements of a displaylistcache configuration.

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

June 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    1 Files
  • 2
    Jun 2nd
    2 Files
  • 3
    Jun 3rd
    19 Files
  • 4
    Jun 4th
    21 Files
  • 5
    Jun 5th
    15 Files
  • 6
    Jun 6th
    12 Files
  • 7
    Jun 7th
    11 Files
  • 8
    Jun 8th
    1 Files
  • 9
    Jun 9th
    1 Files
  • 10
    Jun 10th
    15 Files
  • 11
    Jun 11th
    15 Files
  • 12
    Jun 12th
    15 Files
  • 13
    Jun 13th
    8 Files
  • 14
    Jun 14th
    16 Files
  • 15
    Jun 15th
    2 Files
  • 16
    Jun 16th
    1 Files
  • 17
    Jun 17th
    18 Files
  • 18
    Jun 18th
    15 Files
  • 19
    Jun 19th
    22 Files
  • 20
    Jun 20th
    14 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close