what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

bedatecRealchat.txt

bedatecRealchat.txt
Posted Jul 28, 2005
Authored by Andreas Beck | Site bedatec.de

Realchat version 3.5.1b fails to properly authenticate any logins allowing for user impersonation.

tags | advisory
SHA-256 | 61fe60cdea857d958be0ff0375028d63a0b13ea646380983320846d57c92049b

bedatecRealchat.txt

Change Mirror Download
Bedatec Security Advisory 200506110001
--------------------------------------

Discovered : 2005-06-06
Vendor notified : 2005-06-11
Release date : 2005-06-23
PoC release : around 2005-07-23
Author : Andreas Beck <becka-sav@bedatec.de>
Application : Realchat
Severity : Insecure logon handling allows to impersonate any user
Insecure logon handling allows efficient Spambots.
Strange semantics of the /me command may cause minor
privacy breach.
Risk : Medium (no extra privileges gained, but other users may
be deceived about the identity)
Vendor : http://www.realchat.com/
Vendor status : Vendor notified
Vendor statement : Missing feature. Will be rectified by a release that has
a server side user database.
Affected Versions: At least Version 3.5.1b is affected.
CVE reference : none.


Overview:
---------

Realchat is a popular Java-Client based Chat Software used in quite some
Web communities.

Its logon-Protocol is completely unauthenticated, allowing to impersonate
any user. It is not yet clear, if it could also be exploited to gaining
administrative privileges. According to some webdesigners using the chat,
admin privileges are secured using a password mechanism. However it is
unclear how effective it is.

On a sidenote, using the "/me" command in a private chat session causes
the Text to appear in the main Chatroom, possibly giving away private
information.


Details:
--------

While designing an alternate chat client (the Java client is far too
heavyweight for me), I discovered, that the protocol doesn't seem to
have any authentication.

By modifying the custom chat client to send another username, it was
possible to log on as any user.

However this kind of spoofing is often rather easy to spot, if we are
dealing with administrative accounts, as Realchat uses avatars in its
userlist, which usually differ for admins.

However this is as well easily spoofed, as the number of the avatar
is spoofable in the same way.


Proof of concept/How to reproduce:
----------------------------------

Method 1)

Capture the start of a Chat session.
Replay it, but replace the Username with one of the same length.
Same for the avatar number.

Details on how to do further changes (other length usernames, etc)
in the PoC-Code.


Method 2)

Use a suitable Proxy to modify the page that sets up the chat window or
save it locally and modify it.

PoC Code:
---------

We have a simple working Chatclient that allows to use any username (even
very long names) and any avatar as well as any smiley as an avatar.
There is no support for changing rooms or starting private chat sessions
yet.

PoC code will be withheld for another month to allow webmasters using the
chat to take proper precautions, if they think the threat is worth to
bother.


Vendor Response:
----------------

2005-06-11 -> Realchat notified via EMail
2005-06-13 <- Realchat staff got back to me stating this is a missing
feature and that the /me hole was fixed.
2005-06-13 -> Suggested a simple HMAC-like scheme that would require
sniffing another users session to impersonate him.
2005-06-17 <- Realchat say they will try to implement it until they have a
server based authentication.


Recommendations:
----------------

None yet. The problem must be solved in the chat software. Only disabling
the chat would be a viable workaround.

Don't use /me from private chat windows.


Kind regards,

Andreas Beck

--
Andreas Beck
http://www.bedatec.de/
Login or Register to add favorites

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    25 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close