exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

ContentKeeper-123.25.txt

ContentKeeper-123.25.txt
Posted Oct 2, 2006
Authored by Patrick Webster | Site aushack.com

ContentKeeper 123.25 and below suffers from a design flaw in the user administration interface which reveals account passwords inside the HTML source code. Any authenticated user with appropriate access to the user administration page may use this information to compromise the accounts on other systems.

tags | advisory
SHA-256 | 7fadf9fa09f5f30be956b15ebca46178ed641e6a8ee2f3737f361a88553df408

ContentKeeper-123.25.txt

Change Mirror Download
aushack.com - Vulnerability Advisory
-----------------------------------------------
Release Date:
22-Sep-2006

Software:
ContentKeeper Technologies - ContentKeeper
http://www.contentkeeper.com/

"ContentKeeper is an industry leading Internet content filter that allows
organisations to monitor, manage, control & secure staff access to
Internet resources."

Versions affected:
ContentKeeper 123.25 and below.

Vulnerability discovered:

A design flaw in the user administration interface reveals account
passwords inside the HTML source code. Any authenticated user with
appropriate access to the user administration page may use this
information to compromise the accounts on other systems.

Vulnerability impact:

Low - Unauthorised password disclosure may result in other system account
breaches where the revealed password has been reused.

Vulnerability information

The appliance is administered by use of a web browser HTML based front
end. Authenticated users have access to the account administration page,
whereby they can administer existing usernames, reset passwords, create
and delete accounts etc. The appliance does not hash the existing user
passwords. When the page is requested, the plaintext password for each
account is inserted into the password input value of the FORM element
and sent to the client.

Example:
https://contentkeeperbox/cgi-bin/ck/changepw.cgi

This will return all user details. By viewing the page source,
the password of each account is revealed.

E.g. for user 'root' with a password of 'it_isAs3cret':

<form>
<input name="username" type="text" value="root">Username:
<input type="password" name="password" value="it_isAs3cret">Password:
..
<input name="username" type="text" value="rootBackup">Username:
<input type="password" name="password" value="IamF0rgetful">Password:
</form>

It may be possible to extract this information from the browser cache,
however the HTML content is set to expire immediately.

Solution:
None yet, do not reuse passwords. Future versions may hash the value.

References:
aushack.com advisory
http://www.aushack.com/advisories/200606-contentkeeper.txt

Credit:
Patrick Webster (patrick@aushack.com)

Disclosure timeline:
15-Mar-2006 - Discovered during quick audit - common design flaw.
08-Jun-2006 - Sent to ContentKeeper support.
12-Jun-2006 - Vendor response, update expected July 2006.
22-Sep-2006 - Public disclosure.

EOF
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close