what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Atstake Security Advisory 04-09-28.1

Atstake Security Advisory 04-09-28.1
Posted Oct 7, 2004
Authored by Atstake, Cory Scott | Site atstake.com

Atstake Security Advisory A092804-1 - In the default installation of Vignette portal software, the utility is not secured against anonymous and unauthenticated access. Since many portal deployments are on the Internet or exposed to untrusted networks, this results in an information disclosure vulnerability.

tags | advisory, info disclosure
advisories | CVE-2004-0917
SHA-256 | a8325ff2a0095531d4190a7c7f60437fa2c9dbffbca33fe8c429792d88f520fb

Atstake Security Advisory 04-09-28.1

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

@stake, Inc.
www.atstake.com

Security Advisory

Advisory Name: Vignette Application Portal Unauthenticated
Diagnostics
Release Date: 09-28-2004
Application: Vignette Application Portal
Platform: Multiple
Severity: Unauthenticated diagnostic functionality and
information disclosure
Author: Cory Scott <cscott@atstake.com>
Vendor Status: Vendor has published remediation advice
CVE Candidate: CAN-2004-0917
Reference: www.atstake.com/research/advisories/2004/a092804-1.txt


Overview:

Vignette Application Portal is a portal framework that runs on a
variety of application servers and platforms. As part of the
deployed framework, there is a diagnostic utility that discloses
significant detail on the configuration of the application server,
operating system, and Vignette application. The diagnostic utility,
which is installed by default, exposes details such as application
server and operating system version, database connection parameters,
and bean IDs that are used for access to Vignette portal resources.

In the default installation of the Vignette software, the utility is
not secured against anonymous and unauthenticated access. Since
many portal deployments are on the Internet or exposed to untrusted
networks, this results in an information disclosure vulnerability.

Vignette documentation does not give deployment advice to either
alert administrators to the diagnostic utility's exposure or to
restrict access to the utility. In addition, the utility performs
a set of diagnostic checks that results in system load and outbound
network connections to test portal functionality.


Details:

To access the diagnostic utility, a user makes a web request to
<sitename>/portal/diag/


Vendor Response:

After notification by @stake, Vignette published a knowledge base
article (KB 6947) with remediation advice. It is accessible by
Vignette customers only.


Recommendation:

Restrict access to the diag directory on the web server or
application server. Ultimately, it would make sense for Vignette
to authenticate user requests to the diagnostic utility and
implement access control.


Common Vulnerabilities and Exposures (CVE) Information:

The Common Vulnerabilities and Exposures (CVE) project has assigned
the following names to these issues. These are candidates for
inclusion in the CVE list (http://cve.mitre.org), which standardizes
names for security problems.

CAN-2004-0917 Vignette Application Portal Unauthenticated
Diagnostics

@stake Vulnerability Reporting Policy:
http://www.atstake.com/research/policy/

@stake Advisory Archive:
http://www.atstake.com/research/advisories/

PGP Key:
http://www.atstake.com/research/pgp_key.asc

Copyright 2004 @stake, Inc. All rights reserved.





-----BEGIN PGP SIGNATURE-----
Version: PGP 8.0.3

iQA/AwUBQVlzF0e9kNIfAm4yEQLJjwCcDEFnnacQTF/IOQJTFm3jNZqx4d4AnRZa
W5HemU39ASDoyjnwrbmTQmvU
=ZeJY
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close