exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Rapid7 Security Advisory 5

Rapid7 Security Advisory 5
Posted Sep 9, 2002
Authored by Rapid7 | Site rapid7.com

Rapid 7 Advisory R7-0005 - Granite Software ZMerge Administration Database Has Insecure Default ACLs. In the default configuration, the ZMerge administration database grants Manager access to all users (including anonymous web users). If the administrator neglects to change the database ACLs to something more appropriate, an unauthorized user could modify the data import/export scripts which might then be run by an administrator or scheduled agent.

tags | web
SHA-256 | fca3273915d5d225f6ed4dc2ee16b9d6643cd52d21160ebe5fc11fc9524bc748

Rapid7 Security Advisory 5

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________
Rapid 7, Inc. Security Advisory

Visit http://www.rapid7.com/ to download NeXpose(tm), our
advanced vulnerability scanner. Linux and Windows 2000
versions are available now!
_______________________________________________________________________

Rapid 7 Advisory R7-0005
Granite Software ZMerge Administration Database Insecure Default ACLs

Published: September 6, 2002
Revision: 1.0
CVE ID: CAN-2002-0664
Bugtraq ID: 5101

1. Affected system(s):

KNOWN VULNERABLE:
o ZMerge 4.x
o ZMerge 5.x

2. Summary

ZMerge is a Lotus Notes/Domino tool for mapping data between Lotus
Notes databases and structured data files. It runs on 32-bit MS
Windows. By default, the ZMerge administration database grants
Manager access to all users (including anonymous web users). If
the administrator neglects to change the database ACLs to something
more appropriate, an unauthorized user could modify the data
import/export scripts which might then be run by an administrator
or scheduled agent. Note that while anonymous web users can read
and modify all scripts, they cannot run scripts interactively over
the web.

3. Vendor status and information

ZMerge
Granite Software
http://www.gsw.com

Granite Software was notified on June 12, 2002. They have
acknowledged the issue and agreed to address it in future revisions
of ZMerge by shipping with a more secure default database ACL.
They will also include documentation that includes ACL
considerations for the review by the administrator.

4. Solution

Select the ZMerge administrator database (either zm50adm.nsf or
zmevladm.nsf depending on which version of ZMerge you have). Change
the access level for Default and Anonymous to "No Access".

If this information is not critical for distribution to other
domains, also restrict access for OtherDomainServers to "No Access".

For every entry that you have set to "No Access", verify that
"Read public documents" and "Write public documents" are
unchecked. If not, access will still be permitted for any public
documents (the database About document, etc.).

While not as important, you should repeat this step for all of the
ZMerge documentation and sample databases, including zmguide.nsf,
zmlookup.nsf, and zmsamp*.nsf. Better yet, delete these databases
when you are finished using them.

5. Detailed analysis

The ZMerge administration database contains the data import/export
scripts used with ZMerge. The scripts are interpreted by the ZMerge
program on the server, allowing scripts to read and write arbitrary
files on the server. Several example scripts are included by default.

While the ZMerge administration database allows users to run scripts
from within the Notes client, it is NOT possible for an attacker to
run scripts directly from a web client, because the database makes use
of the Notes formula language "@ functions", which cannot run in the web
context. However, a web user could still read and modify existing
scripts which may then be run as part of an agent or scheduled server
task (or run directly by an unsuspecting administrator).

Furthermore, since an attacker could use the information in the scripts
(filenames and contents) to gain information about the server (the
physical web root, for example), non-Administrative users should not
have even "Reader" access to this database.

6. Contact Information

Rapid 7 Security Advisories
Email: advisory@rapid7.com
Web: http://www.rapid7.com/
Phone: +1 (212) 558-8700
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (OpenBSD)

iD8DBQE9ePpDcL76DCfug6wRAkGyAJ9TmiVLzxabeot55ua0lqh4G1sp/QCeIvXv
JgKsMUbOMMQSJiB4vsqPPsU=
=iqgl
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    18 Files
  • 14
    Aug 14th
    50 Files
  • 15
    Aug 15th
    33 Files
  • 16
    Aug 16th
    23 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    43 Files
  • 20
    Aug 20th
    29 Files
  • 21
    Aug 21st
    42 Files
  • 22
    Aug 22nd
    26 Files
  • 23
    Aug 23rd
    25 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close