[Full-Disclosure] Corsaire Security Advisory: PeopleSoft Gateway Administration servlet path disclosure issue

From: advisories (advisories_at_corsaire.com)
Date: 11/13/03

  • Next message: Jeremiah Cornelius: "Re: [Full-Disclosure] SSH Exploit Request"
    To: <full-disclosure@lists.netsys.com>
    Date: Thu, 13 Nov 2003 09:48:43 -0000
    
    

    -- Corsaire Security Advisory --

    Title: PeopleSoft Gateway Administration servlet path disclosure issue
    Date: 04.07.03
    Application: PeopleTools 8.20/8.43 and prior
    Environment: Various
    Author: Martin O'Neal [martin.oneal@corsaire.com]
    Audience: General distribution
    Reference: c030704-003

    -- Scope --

    The aim of this document is to clearly define a vulnerability in the
    PeopleSoft Gateway Administration servlet, as supplied by PeopleSoft
    Ltd. [1], that allows an attacker to disclose the actual path of server
    configuration files.

    -- History --

    Discovered: 01.07.03 (Martin O'Neal)
    Vendor notified: 04.07.03
    Document released: 12.11.03

    -- Overview --

    The PeopleSoft Gateway Administration servlet provides a web-based
    interface to configure handlers. In the event of an invalid value being
    entered, the actual path of the server side configuration files is
    disclosed in the error response.

    -- Analysis --

    The gateway.administration servlet is used within the PeopleSoft
    environment to configure handlers. This application accepts a number of
    values via an HTML form. If an invalid value is entered, then the
    servlet responds with an error page that contains the actual path of the
    server side configuration files.

    This path can then be used in conjunction with other potential
    vulnerabilities to attack specific OS and application configuration
    files.

    -- Recommendations --

    PeopleSoft have released details of this and other issues under security
    rollup vulnerability ID 20031112, which is available to registered users
    from the PeopleSoft support site [2].

    PeopleSoft recommends that customers address the vulnerability by
    applying the following fixes available on PeopleSoft Customer
    Connection.

       Release Patch
       8.18 8.18.15
       8.19 8.19.12
       8.20 8.20.03
       8.42 8.42.14
       8.43 8.43.11

    For those who can not implement the patches promptly, as a mitigating
    strategy a firewall or other HTTP filtering device can be used to block
    queries containing sensitive strings, or as a last resort the
    administration functionality of the PeopleSoft Gateway can be disabled
    by restricting access to the servlet itself.

    -- CVE --

    The Common Vulnerabilities and Exposures (CVE) project has assigned
    the name CAN-2003-0628 to this issue. This is a candidate for
    inclusion in the CVE list (http://cve.mitre.org), which standardises
    names for security problems.

    -- References --

    [1] http://www.peoplesoft.com
    [2] http://www.peoplesoft.com/corp/en/patch_fix/search.jsp

    -- Revision --

    a. Initial release.
    b. Revised to include vendor information.

    -- Distribution --

    This security advisory may be freely distributed, provided that it
    remains unaltered and in its original form.

    -- Disclaimer --

    The information contained within this advisory is supplied "as-is" with
    no warranties or guarantees of fitness of use or otherwise. Corsaire
    accepts no responsibility for any damage caused by the use or misuse of
    this information.

    Copyright 2003 Corsaire Limited. All rights reserved.

    ----------------------------------------------------------------------
    CONFIDENTIALITY: This e-mail and any files transmitted with it are
    confidential and intended solely for the use of the recipient(s) only.
    Any review, retransmission, dissemination or other use of, or taking
    any action in reliance upon this information by persons or entities
    other than the intended recipient(s) is prohibited. If you have
    received this e-mail in error please notify the sender immediately
    and destroy the material whether stored on a computer or otherwise.
    ----------------------------------------------------------------------
    DISCLAIMER: Any views or opinions presented within this e-mail are
    solely those of the author and do not necessarily represent those
    of Corsaire Limited, unless otherwise specifically stated.
    ----------------------------------------------------------------------
    Corsaire Limited, 3 Tannery House, Tannery Lane, Send, Surrey, GU23 7EF
    Telephone: +44(0)1483-226000 Email:info@corsaire.com

    _______________________________________________
    Full-Disclosure - We believe in it.
    Charter: http://lists.netsys.com/full-disclosure-charter.html


  • Next message: Jeremiah Cornelius: "Re: [Full-Disclosure] SSH Exploit Request"

    Relevant Pages