exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Enomaly ECP 3.0.4 Insecure Silent Update Mechanism

Enomaly ECP 3.0.4 Insecure Silent Update Mechanism
Posted Feb 16, 2010
Authored by Sam Johnston

Enomaly ECP versions up to and including 3.0.4 are believed to contain an insecure silent update mechanism that could allow a remote attacker to execute arbitrary code as root, and to inject or modify VM workloads for execution within user environment or to replay older, insecure workloads. Both the Enomaly ECP implementation and the VMcasting protocol itself are believed to be vulnerable.

tags | advisory, remote, arbitrary, root, protocol
SHA-256 | e16285c2f1ba9ebc8fd42584526dc51cf5c5ff2063e048b6d25545b604a2ead0

Enomaly ECP 3.0.4 Insecure Silent Update Mechanism

Change Mirror Download
Enomaly ECP: Multiple vulnerabilities in VMcasting protocol & implementation.

Synopsis

Enomaly ECP up to and including v3.0.4 is believed to contain an insecure
silent update mechanism that could allow a remote attacker to execute
arbitrary code as root, and to inject or modify VM workloads for execution
within user environment or to replay older, insecure workloads.

Both the Enomaly ECP implementation and the VMcasting protocol itself are
believed to be vulnerable.

Background

Enomaly ECP is management software for virtual machines in cloud computing
environments.

Description

Sam Johnston (http://samj.net/) of Australian Online Solutions
(http://www.aos.net.au) reported that the vmfeed module, an insecure
implementation of the insecure VMcasting protocol (http://www.vmcasting.org/)
includes a silent update mechanism that downloads and executes Python code
from Enomaly's corporate web server (http://enomaly.com/fileadmin/eggs/)
over HTTP, without authentication or integrity checks. The code is triggered
when the "application/python-egg" MIME type is encountered.

The module also contains functionality for downloading workloads (virtual
machines) from a feed which is itself retrieved over HTTP. While the VMcasting
protocol (http://www.vmcasting.org/) describes a mechanism for digitally
signing payloads, the mechanism is not implemented and there is no requirement
to transfer feeds securely (e.g. over HTTPS). The implementation itself
actively rejects URLs that do not start with "http" or "ftp" with an error.

The module has the following feeds hardcoded:
- Enomalism VMCasting Test Feed [http://enomalism.com/vmcast_appliances.php]
- VMCasting Production Module Feed [http://enomalism.com/vmcast_modules.php]

Impact

Combined with the ability to intercept requests to Enomaly's corporate web
server by other means such as ARP or DNS spoofing, or compromise the server
itself or any intermediary server, it may be possible to execute arbitrary
commands as the root user on any server requesting the feeds. It may also be
possible for an attacker to run workloads of their choice, to modify existing
workloads and to replay old, known-insecure workloads (even if signed).

Workaround

Resolve enomalism.com and enomaly.com to 127.0.0.1 in affected servers' hosts
files or migrate to OpenECP which includes fixes for the vulnerabilities.

Resolution

There is no resolution at this time as the feature cannot be disabled. Vendor
did not confirm whether subsequent/future releases [will] address the problem.

History

2009-11-02 Open source distributions for Enomaly ECP removed from Internet.
2010-01-06 Email request for open source code Enomaly ECP code denied by CEO.
2010-02-03 Public discussion of vulnerability, verified in current source.
2010-02-03 Strategic Advisor & Board Member claims "Many of the items have
been addressed in [Service Provider Edition and soon to be released High
Assurance] editions. We will review your comments above for future inclusion
into our product road map". Fails to identify which issues remain.
2010-02-09 OpenECP forked from Enomaly ECP, resolves vulnerabilities.
2010-02-09 Chief Technologist claims "ECP 3.0 is a significantly different
product than 2.0 servicing different market needs. [...] Technically ECP2.0
was Enomalism 2.0, not the Elastic Computing platform."
2010-02-10 Changelogs showing common lineage are removed from Internet.
2010-02-?? http://src.enomaly.com is restored claiming "Our current platform,
Enomaly ECP Service Provider Edition, is a completely different product."
2010-02-16 Vulnerability report released unverified.
Login or Register to add favorites

File Archive:

May 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    15 Files
  • 2
    May 2nd
    16 Files
  • 3
    May 3rd
    38 Files
  • 4
    May 4th
    15 Files
  • 5
    May 5th
    35 Files
  • 6
    May 6th
    0 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    8 Files
  • 9
    May 9th
    65 Files
  • 10
    May 10th
    19 Files
  • 11
    May 11th
    27 Files
  • 12
    May 12th
    8 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    1 Files
  • 15
    May 15th
    19 Files
  • 16
    May 16th
    66 Files
  • 17
    May 17th
    28 Files
  • 18
    May 18th
    32 Files
  • 19
    May 19th
    13 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    23 Files
  • 23
    May 23rd
    15 Files
  • 24
    May 24th
    49 Files
  • 25
    May 25th
    20 Files
  • 26
    May 26th
    13 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    11 Files
  • 30
    May 30th
    46 Files
  • 31
    May 31st
    15 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close