what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

n.runs-SA-2008.001.txt

n.runs-SA-2008.001.txt
Posted Jun 23, 2008
Authored by Thierry Zoller, Frank Dick | Site nruns.com

Jscape Secure FTP Applet does not perform SSH host key verification allowing man in the middle attacks.

tags | advisory
SHA-256 | faae475df15c9545776b1f8e33f497ed17c8c899a7b8c58535a164d5dafe252d

n.runs-SA-2008.001.txt

Change Mirror Download
n.runs AG
http://www.nruns.com/
security(at)nruns.com
n.runs-SA-2008.001
23-June-2008

____________________________________________________________________________
____

Vendor: Jscape, http://www.jscape.com/
Affected Products: Jscape Secure FTP Applet
http://www.jscape.com/sftpapplet/index.html
Vulnerability: SSH Host key is not verified allowing for Man in the
Middle
attacks
Risk: High
____________________________________________________________________________
____


Overview
^^^^^^^^
JSCAPE software has been deployed in a wide array of industries including
aerospace, banking, communications, education, insurance, finance,
government and software. With customers in more than 50 countries worldwide
the following is a small sample of companies who use JSCAPE products and
services. Customers include Boeing, SUN, ISS, SAP - See
http://www.jscape.com/clients.html for more details.

Secure FTP Applet is a secure FTP client component that runs within your web
browser. Secure FTP Applet [..] while encrypting all data exchanged between
the client and server using either the SFTP (FTP over SSH) or FTPS (FTP over
SSL) protocols [..] ensuring that all data exchanged is completely secure.


Description
^^^^^^^^^^^
During the connection the Applet does not verify or display the host key. As
such n.runs was able to perform a man in the middle attack during a
penetration test at a client.
Read more about SSH Host verification:
http://www.securityfocus.com/infocus/1806

Impact
^^^^^^
The supposedly secure connection is no longer secure. n.runs was able to
extract login, password and data with a simple SSH Man in the Middle attack.

Solution:
^^^^^^^^^
Upgrade to version 4.9.0 or above

____________________________________________________________________________
____

Vendor communication:

2006/04/12 n.runs sends a Vulnerability notice informing Jscape about
the
nature of the problem and the impact.
2006/04/13 Jscape acknowledges and ask for more details
2006/04/13 n.runs sends more details
2007/07/26 n.runs asks for feedback and if the problem has been patched
2007/07/26 Jscape replies "We do not have a release date yet for this
task"
2007/07/26 n.runs asks whether they can offer a estimate when the patch
will be available
2007/07/26 Jscape answers again "We do not have a release date yet for
this
task"
2008/02/19 n.runs requests a statement to be used in the advisory as
there
seems to be no intention to patch and argues "you deem this
problem as low yet it renders the *secure connection*
insecure."
2008/02/20 Jscape promises to "continue to look into this issue and
notify
you when a patch is available.
2008/02/25 n.runs notifies Jscape that an advisory will be released by
the
end of the week if they do not patch the flaw n.runs reported

roughly 2 years ago.
"Given the long time this has already been reported
(12/2006),
and the criticality of this issue, I would expect a patch to
be
ready by the end of the week. If the patch is not available
until
the end of this week (29.02.2008) I'll proceed with the
advisory"
2008/02/29 Jscape notifies n.runs that the flaw has been patched
2008/06/01 n.runs verifies the patch and confirms that Man in the Middle
is
not longer possible if the user does not accept the new key.
n.runs however recommends that Jscape warns the users of the
security implications of a new SSH Host key rather then
simply
displaying "New Host key".
____________________________________________________________________________
____

Credit
^^^^^^
Vulnerability discovered by Frank Dick and Thierry Zoller of n.runs AG.

About n.runs
^^^^^^^^^^^^
n.runs AG is a vendor-independent consulting company specialising in the
areas of: IT Infrastructure, IT Security and IT Business Consulting. In
2007, n.runs expanded its core business area, which until then had been
project based consulting, to include the development of high-end security
solutions.
Application Protection System - Anti Virus (aps-AV) is the first high-end
security solution that n.runs is bringing to the market.

Advisories can be found at : http://www.nruns.com/security_advisory.php

Copyright Notice
^^^^^^^^^^^^^^^^
Unnaltered electronic reproduction of this advisory is permitted. For all
other reproduction or publication, in printing or otherwise, contact
security@nruns.com for permission. Use of the advisory constitutes
acceptance for use in an "as is" condition. All warranties are excluded. In
no event shall n.runs be liable for any damages whatsoever including direct,
indirect, incidental, consequential, loss of business profits or special
damages, even if n.runs has been advised of the possibility of such
damages.

Copyright n.runs AG. All rights reserved. Terms of use apply.

____________________________________________________________________________
____

Subscribe to the n.runs newsletter to be informed of the latest threats and
tools by signing up to : http://www.nruns.com/newsletter_en.php
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close