exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

gosecure-2004-10.txt

gosecure-2004-10.txt
Posted Oct 13, 2004
Authored by Jian Hui Wang | Site gosecure.ca

When a valid user tries to authenticate via the Neoteris Instant Virtual Extranet VPN solution and the password is expired, the user will be asked to change their password and be directly forwarded to the changepassword.cgi without asking for any form of authentication.

tags | advisory, cgi
SHA-256 | 9d6bd69e3a83d7032a8b00df8ff0d7a16f105485d603eaa8ed60656a80d2cdba

gosecure-2004-10.txt

Change Mirror Download


GoSecure Advisory #GS041006



Neoteris IVE changepassword.cgi Authentication Bypass



Date Published: 2004-10-06

Date Discovered: 2004-07-23



CVE ID: CAN-2004-0939



Class: Design Error



Risk: Medium



Vendor: Juniper Networks

www.juniper.net



Advisory URL:

http://www.gosecure.ca/SecInfo/gosecure-2004-10.txt



Affected System:



Neoteris Instant Virtual Extranet (IVE) OS, Version 3.x Netories Instant Virtual Extranet (IVE) OS, Version 4.x



Description:



Neoteris Instant Virtual Extranet (IVE) is a well known "clientless" SSL VPN solution for internal network remote access via a standard web browser. It is widely used as an extranet portal for corporate networks.



While doing an ethical hacking assessment of a Juniper customer, GoSecure discovered a vulnerability regarding Neoteris IVE password management.



When a valid user tries to authenticate via the IVE and the password is expired, the user will be asked to change their password and be directly forwarded to the "changepassword.cgi" without asking for any form of authentication.



The username, authentication server and type will be appended to the “changepassword.cgi” URL. Since the "changepassword.cgi" allows the user to try the old password as many times as they want, the unit effectively allows a brute force password attack.



If an attacker were to obtain a username through various public information gathering techniques, they could attempt to find an account with a password that has expired and brute force that account to eventually gain unauthorized access.



This vulnerability only affects IVE products that are configured with LDAP or an NT domain authentication server. Other type of authentication servers are not affected.



Solution:



The vendor has released a patch and an advisory to address this issue.

The advisory is available the following location:



http://www.juniper.net/alerts/viewalert.jsp?actionBtn=Seach&txtAlertNumber=PSN-2004-08-25&viewMode=view



Credits:



GoSecure would like to thank Juniper's quick response on providing a solution for its customers. This vulnerability was found by Jian Hui Wang, part of GoSecure's vulnerability research team.



Copyright (c) 2002-2004 GoSecure Inc



Permission is hereby granted for the redistribution of this alert electronically. It is not to be edited in any way without express consent of Gosecure. If you wish to reprint the whole or any part of this alert in any other medium excluding electronic medium, please email info@gosecure.ca for permission.



Disclaimer



The information within this advisory may change without notice. There are no warranties, implied or express, with regard to this information. In no event shall the author be liable for any direct or indirect damages whatever arising out or in connection with the use or spread of this information. Any use of this information is at the user's own risk.



http://www.gosecure.ca



Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close