exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

caEnumeration.txt

caEnumeration.txt
Posted Sep 21, 2004
Authored by Thomas Adams

The CA UniCenter Management Portal versions 2.0 and 3.1 allow for username validation via using the forgotten password feature.

tags | advisory
SHA-256 | f4684da5e0c106476f2f770687c530b369035e7571afebec64cbbc77d926592a

caEnumeration.txt

Change Mirror Download


CA UniCenter Management Portal Username Enumeration Vulnerability

Package: CA UniCenter Management Portal
Vendor Web Site: http://www.ca.com
Versions: UniCenter Management Portal 2.0 and 3.1
Platform: Windows
Local: No
Remote: Yes
Fix Available: Yes
Advisory Author: Thomas Adams (tgadams@bellsouth.net)


Background:
>From www.ca.com: "Unicenter Management Portal provides intuitive access to enterprise management information,offering a personalized web interface for various Unicenter management solutions. Security and administrative control are provided through pre-defined workplaces. Filtered event notifications can be customized to suit individual roles and responsibilities, for personalized views tailored to your users' unique needs."
The portal provides a forgot password link, that does not give a proper response for an invalid user. Using a script, an attacker can quickly find users that have access to the web interface using the technique below. This will help facilitate brute force attacks
against the server.



Exploit:
Connect to the management portal(default 8080). Choose the 'Forgot your Password?' option. Enter a username, such as test. If the test account does not exists, the following will be displayed: "User not found: test" A legit account will produce a "Password has been sent" or "Email address not Found" message.



Vendor Response:
CAs recommendation was to disable the 'Forgot Password' feature. To isable this option in the Portal, add the following line to the [PORTAL_INSTALL]\properties\local.properties file.

show.passwords.in.api=false

You will need to restart the portal after manually editing the file.
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close