what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

CVE-2008-4000.txt

CVE-2008-4000.txt
Posted Oct 20, 2008
Authored by Amichai Shulman | Site imperva.com

PeopleTools version 8.49 suffers from a brute forcing vulnerability that bypasses the account lock-out mechanism.

tags | advisory
advisories | CVE-2008-4000
SHA-256 | 1794832b45dbd92fd22d7dfa4a7894a3017ca74fc0a57e60ed4181884fae20ed

CVE-2008-4000.txt

Change Mirror Download
PeopleSoft Enterprise applications architecture is built around the proprietary PeopleTools technology. PeopleTools user authentication mechanism requires a user to provide the correct credentials in order to gain access through the web interface. An account lockout policy disables a user account if an incorrect password is entered a specified number of times over a specified period. 


Scope

Imperva’s Application Defense Center conducts extensive research on enterprise applications on behalf of its customers, including research on applications like PeopleSoft, SAP and Oracle EBS. During its research, the team has identified a security flaw related to PeopleTools authentication mechanism and account lock-out policy.


Findings

By observing the system’s response to repeated authentication attempts, an attacker can brute force valid user credentials even though the account lock-out mechanism is enabled. The attacker could use the compromised credentials once the account is unlocked by an administrator.


Details

Upon a false login attempt, the message “Your User ID and/or Password are invalid” is returned to the user. When the correct password is entered, and the account has been locked, the message “Your account has been disabled” is returned. Therefore an attacker can conduct a brute force attack even after the account has been locked.

Once the account is unlocked, PeopleTools does not enforce password changing. Therefore the compromised set of credentials can be used to break into the unlocked account.


Exploit

Brute force login to the application until the correct password is detected.


Vulnerability ID

CVE-2008-4000


Tested Versions

Vulnerable
PeopleTools 8.49 (8.4x)


Vendor's Status

Vendor notified on August 4, 2008. Patch released by vendor on October 14, 2008.


Workaround


Within PeopleSoft, select the “Enable password controls” checkbox and then define the number of days that a password is valid. The actual number of days does not matter for this purpose.
When an account is locked because of too many login attempts, the administrator can unlock the account and then manually set the status of the password for the account to “expired”. This will force the user to change the password during the next login.
An alternative workaround is to create a custom Web application policy in the SecureSphere Web Application Firewall. The policy match criteria would include the URL prefix of the PeopleSoft login page (the action URL for the authentication form) and the number of occurrences within a specified period of time.


Discovered by:

Yaniv Azaria of Imperva’s ADC

Disclaimer
The information within this advisory is subject to change without notice. Use of this information constitutes acceptance for use in an AS IS condition. Any use of this information is at the user’s own risk. There are no warranties, implied or expressed, with regard to this information. In no event shall the author be liable for any direct or indirect damages whatsoever arising out of or in connection with the use or spread of this information.

Copyright © 2007 Imperva, Inc.
Redistribution of this alert electronically is allowed as long as it is not edited in any way. To reprint this alert, in whole or in part, in any medium other than electronic medium, adc@imperva.com for permission. Sections
ADC Security Advisories
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close