iDEFENSE Security Advisory 06.22.05: IpSwitch WhatsUp Professional 2005 (SP1) SQL Injection Vulnerability

From: iDEFENSE Labs (labs-no-reply_at_idefense.com)
Date: 06/22/05

  • Next message: Sune Kloppenborg Jeppesen: "[ GLSA 200506-22 ] sudo: Arbitrary command execution"
    Date: Wed, 22 Jun 2005 15:46:02 -0400
    To: <bugtraq@securityfocus.com>, <vulnwatch@vulnwatch.org>, <full-disclosure@lists.grok.org.uk>
    
    

    IpSwitch WhatsUp Professional 2005 (SP1) SQL Injection Vulnerability

    iDEFENSE Security Advisory 06.22.05
    www.idefense.com/application/poi/display?id=268&type=vulnerabilities
    June 22, 2005

    I. BACKGROUND

    WhatsUp Professional 2005 SP1 is a network management solution for small
    and mid sized organizations. Further information is available at:

       http://www.ipswitch.com/Products/WhatsUp/professional/index.html

    II. DESCRIPTION

    Remote exploitation of a SQL injection vulnerability in IpSwitch Inc.'s
    WhatsUp Professional 2005 Service Pack 1 could allow a remote attacker
    to gain administrative access to the application.

    The main logon screen for the web based front end does not properly
    validate input, allowing for SQL injection attacks to occur. SQL
    commands can be submitted through the "User Name" and "Password" fields
    on the default login page.

    The web front end is not enabled by default and must be running for the
    application to be vulnerable. It can be enabled under the "Configure",
    "Program Options" menu by checking the "Enable web server on port [80]"
    checkbox.

    Exploit code for this vulnerability is unnecessary; the following SQL
    injection attacks can be executed in the "User Name" field of the
    http://[target]/NmConsole/Login.asp page:

    Reset the Admin user password with a blank password:
    - 'UPDATE WebUser SET sPassword=DEFAULT WHERE sUserName='Admin'--

    Elevate Guest user privileges to Admin privileges:
    - 'UPDATE WebUser SET nUserRightsMask=-1 WHERE sUserName='guest'--

    III. ANALYSIS

    Successful exploitation allows unauthenticated remote attackers to gain
    administrative access to the WhatsUp Professional application. SQL
    injection attacks can be used to either elevate the privileges of the
    Guest user or to change/erase the password of the Admin user. Either
    approach will provide a remote attacker with full administrative access
    to the application. By default, the Guest user is enabled but has
    limited access to the application and the account has a blank password.

    IV. DETECTION

    iDEFENSE has confirmed the existence of this vulnerability against
    WhatsUp Gold Professional 2005 SP1 running on Windows XP Professional
    SP1.

    V. WORKAROUND

    Disabling the web front end to WhatsUp Gold Professional 2005 (SP1) will
    prevent the ability to exploit this vulnerability. It can be disabled
    under the "Configure", "Program Options" menu by unchecking the "Enable
    web server on port [80]" checkbox.

    VI. VENDOR RESPONSE

    This vulnerability is addressed in WhatsUP Pro 2005 SP1a.

    A change log detailing changes in SP1a is available at:

    http://www.ipswitch.com/forums/shwmessage.aspx?ForumID=20&MessageID=7699

    VII. CVE INFORMATION

    The Common Vulnerabilities and Exposures (CVE) project has assigned the
    name CAN-2005-1250 to this issue. This is a candidate for inclusion in
    the CVE list (http://cve.mitre.org), which standardizes names for
    security problems.

    VIII. DISCLOSURE TIMELINE

    04/25/2005 Initial vendor notification
    05/10/2005 Initial vendor response
    06/22/2005 Coordinated public disclosure

    IX. CREDIT

    The discoverer of this vulnerability wishes to remain anonymous.

    Get paid for vulnerability research
    http://www.idefense.com/poi/teams/vcp.jsp

    Free tools, research and upcoming events
    http://labs.idefense.com

    X. LEGAL NOTICES

    Copyright (c) 2005 iDEFENSE, Inc.

    Permission is granted for the redistribution of this alert
    electronically. It may not be edited in any way without the express
    written consent of iDEFENSE. If you wish to reprint the whole or any
    part of this alert in any other medium other than electronically, please
    email customerservice@idefense.com for permission.

    Disclaimer: The information in the advisory is believed to be accurate
    at the time of publishing based on currently available information. Use
    of the information constitutes acceptance for use in an AS IS condition.
    There are no warranties with regard to this information. Neither the
    author nor the publisher accepts any liability for any direct, indirect,
    or consequential loss or damage arising from use of, or reliance on,
    this information.


  • Next message: Sune Kloppenborg Jeppesen: "[ GLSA 200506-22 ] sudo: Arbitrary command execution"

    Relevant Pages