For the record, per request via a private reply from a Cisco employee (not
Ryan), I emailed the Cisco PSIRT team about this issue.

On Thu, Mar 15, 2018 at 10:36 AM Ryan Ratliff (rratliff) <rratl...@cisco.com>
wrote:

> There’s an internal defect on this that cites CSCvb33351 as the source of
> the fix for this problem, fixed in 12.0.
>
> Interestingly enough for me in Firefox (on 12.0) I don’t get ccmadmin
> passwords auto-populated in ssh fields, but I do get saved ssh
> username/passwords auto-populated in the ccmadmin login fields.
>
> Thanks for raising this issue everyone.
>
> -Ryan
>
> On Mar 15, 2018, at 7:54 AM, Anthony Holloway <
> avholloway+cisco-v...@gmail.com> wrote:
>
> I didn't actually check the file contents before replying.  What I meant
> to say was, the ConfigFileCacheList.txt is the file I was wondering if
> existed.  Since it does, then one could write a scraping tool to search for
> and confirm credentials in one fell swoop.
>
> Thanks for the information, Stephen.
>
> I should also mention, some members of this group are replying to me
> directly, off the list, and the results are confirming that this is indeed
> an issue worth Cisco's time and attention.  One member of the list
> confirmed that passwords stored with 3rd party password tools, such as
> LastPass, protect you from this behavior.
>
> Like I said earlier, it's the browser/user causing the autocomplete to
> happen, but Cisco's attempt to have these fields NOT auto filled, is faulty.
>
> You can read more below on why that might be.
>
>
> https://developer.mozilla.org/en-US/docs/Web/Security/Securing_your_site/Turning_off_form_autocompletion#The_autocomplete_attribute_and_login_fields
>
> <image.png>
>
> On Thu, Mar 15, 2018 at 7:46 AM Anthony Holloway <
> avholloway+cisco-v...@gmail.com> wrote:
>
>> I don't know about any of those additional files, and the FileList one
>> was something I was looking for.
>>
>> Today's goal will be to write a Python script to: grab that file, then
>> grab all phone configs, then auth against CUCM, and finally, store the
>> credentials that worked.
>>
>> It might even be worth looking at the credentials which don't work,
>> because it might tell you something about password habits, allowing you to
>> predict future passwords. Eg Summer2010
>>
>> On Mar 15, 2018 2:34 AM, "Stephen Welsh" <stephen.we...@unifiedfx.com>
>> wrote:
>>
>>> While we are on the subject here are some other non encrypted TFTP
>>> server items:
>>>
>>>
>>>    - ConfigFileCacheList.txt
>>>    - FileList.txt
>>>    - BinFileCacheList.txt
>>>    - PerfMon.txt
>>>    - ParamList.txt
>>>    - lddefault.cfg
>>>
>>> So you could use the following to get a list of all the device MAC
>>> addresses anonymously from the TFTP server:
>>>
>>> http://TFTPServer:6970/FileList.txt
>>> <http://tftpserver:6970/FileList.txt>
>>>
>>> So with the scenario you describe and just the TFTP Server IP Address
>>> you could scan all the device configs on the cluster to see if even just
>>> one of them has the admin credentials saved accidentally on the SSH
>>> User/Password field.
>>>
>>> I suspect this may apply to most clusters....
>>>
>>> Kind Regards
>>>
>>> Stephen Welsh
>>> CTO
>>> UnifiedFX
>>>
>>> On 15 Mar 2018, at 07:25, Stephen Welsh <stephen.we...@unifiedfx.com>
>>> wrote:
>>>
>>> Hi Anthony,
>>>
>>> Yes, the SSH credentials saved on the device page are available in clear
>>> text in the phone XML config, it’s not just your environment unfortunately.
>>> Also I believe the same thing applies for the Telepresence endpoints
>>> (anything running CE including the DX) for the web page admin credentials
>>> that are saved in the vendor config section.
>>>
>>> We noticed this a little while ago but given most people did not
>>> populate it did not consider as a serious issue, however the
>>> auto-population of credentials is not something we considered. So yes this
>>> does look like a serious problem when you combine those two together.
>>>
>>> Kind Regards
>>>
>>> Stephen Welsh
>>> CTO
>>> UnifiedFX
>>>
>>> On 15 Mar 2018, at 01:50, Anthony Holloway <
>>> avholloway+cisco-v...@gmail.com> wrote:
>>>
>>> I'm working on something, and was wondering if you could check something
>>> for me, so I can better understand why and how often this is happening.
>>>
>>> So, I was looking at phone config file today, and I noticed the ccmadmin
>>> username and password was in the XML, and in plain text nonetheless.
>>>
>>> I found out that the browser, when told to remember your credentials,
>>> will treat the SSH username/password fields as login fields whenever you
>>> modify a phone, and you might be unknowingly save your credentials for
>>> clear text view by unauthenticated users.
>>>
>>> Is anyone already aware of this?
>>>
>>> You could you run the following command on your clusters:
>>>
>>> *run sql select name, sshuserid from device where sshuserid is not null
>>> and sshuserid <> ""*
>>>
>>> Then in the output, if there are any hits, look at the config XML file
>>> for the phone and see if the passwords are there.
>>>
>>> E.g.,
>>>
>>> output might be:
>>>
>>> *SEP6899CD84B710 aholloway*
>>>
>>> So then you would navigate your browser to:
>>>
>>> *http://<tftpserver>:6970/SEP6899CD84B710.cnf.xml*
>>>
>>> You then might have to view the HTML source of the page, because the
>>> browser might mess up the output.
>>>
>>> You're then looking for the following two fields, your results will vary:
>>>
>>> *<sshUserId>aholloway</sshUserId>*
>>> *<sshPassword>MyP@ssw0rd</sshPassword>*
>>>
>>> Then, since we now know it's happening, get list of how many different
>>> usernames you have with this command:
>>>
>>> *run sql select distinct sshuserid from device where sshuserid is not
>>> null and sshuserid <> "" order by sshuserid*
>>>
>>> This could also be happening with Energy Wise settings, albeit not on
>>> the same web pages.
>>>
>>> I'm curious about two things:
>>>
>>> 1) Is it even happening outside of my limited testing scenarios?
>>> 2) How many different usernames and passwords were there?
>>>
>>> If the answers are yes, and 1 or more, then this is an issue Cisco
>>> should address.
>>>
>>> The reason it's happening is because the way in which browsers identify
>>> login forms, is different from the way in which web developers understand
>>> it to work.  Cisco uses the element attribute on these fields "autocomplete
>>> = false" and unfortunately, most browser ignore that directive.
>>>
>>> I have noticed that this does not happen, if you have more than 1 saved
>>> password for the same site, rather it will only happen if you use the same
>>> login for the entire site.  Our highest chance of seeing this happen are
>>> for operations teams where they login with their own accounts, and do not
>>> use DRS or OS Admin.
>>>
>>> _______________________________________________
>>> cisco-voip mailing list
>>> cisco-voip@puck.nether.net
>>> https://puck.nether.net/mailman/listinfo/cisco-voip
>>>
>>> _______________________________________________
>>> cisco-voip mailing list
>>> cisco-voip@puck.nether.net
>>> https://puck.nether.net/mailman/listinfo/cisco-voip
>>>
>>> _______________________________________________
> cisco-voip mailing list
> cisco-voip@puck.nether.net
> https://puck.nether.net/mailman/listinfo/cisco-voip
>
_______________________________________________
cisco-voip mailing list
cisco-voip@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-voip

Reply via email to