full-disclosure-uk May 2007 archive
Main Archive Page > Month Archives  > full-disclosure-uk archives
full-disclosure-uk: [Full-disclosure] SEC Consult SA-20070509-0

[Full-disclosure] SEC Consult SA-20070509-0 :: Multiple vulnerabilites in Nokia Intellisync Mobile Suite & Wireless Email Express

From: Johannes Greil <research_at_nospam>
Date: Wed May 09 2007 - 08:40:25 GMT
To: full-disclosure@lists.grok.org.uk, bugtraq@securityfocus.com


SEC Consult Security Advisory < 20070509-0 >


title: Multiple vulnerabilites in Nokia Intellisync Mobile Suite & Wireless Email Express (Information / Source Code Disclosure, Cross Site Scripting, Denial of Service) program: Nokia Intellisync Mobile Suite - Novell Groupwise bundle & Nokia Intellisync Wireless Email Express vulnerable version: 6.4.31.2, 6.6.0.107, 6.6.2.2 other versions were not tested! impact: medium homepage: http://www.intellisync.com/ found: 2007-03-14 by: Johannes Greil / SEC Consult / www.sec-consult.com =======================================================================

Vendor description:


Nokia Intellisync Mobile Suite is a portfolio of products that reside on a single server and can be used alone or together to create a comprehensive mobility solution. The Nokia Intellisync Mobile Suite server provides large businesses with the flexibility, manageability and  extensibility to connect virtually any corporate data to virtually any device over almost any network to meet both current and future mobility needs.

[Source: http://europe.nokia.com/A4162029]

Note: According to Nokia Austria support the tested versions were a bundle version from Novell to support Groupwise functionality hence Novell is responsible (according to Nokia).

It seems there exist many different versions of the same or very similar product. During a short review of an installation of Nokia Intellisync Wireless Email Express it was found to be partially vulnerable too.

Vulnerability overview:


  • The bundled Apache Tomcat v5.0.25 suffers from an information disclosure vulnerability which allows an attacker to view the directory listing and the source code of the application.
  • Some ASP scripts under /usrmgr/ list all configured users including the mail server address with userid (but no password).
  • Furthermore it is possible to deactivate all users and denial access to the system.
  • Some ASP scripts are vulnerable to cross site scripting attacks.

An attacker does not need to be authenticated to perform those attacks!

Vulnerability description:


  1. Directory listing & source code information disclosure

It seems that (at least) versions v6.4.31.2, v6.6.0.107 and v6.6.2.2 are bundled with Apache Tomcat v5.0.25. This Tomcat version suffers from a known directory listing information disclosure vulnerability. more information: http://www.securityfocus.com/bid/19106/info

The original advisory doesn't mention though that it is also possible to disclose the source code of the underlying applications!

Proof of concept:



Directory Listing: http://$host/;.jsp

Source Code Disclosure: http://$host/en/logon.asp;.jsp

2) User accounts information disclosure

E.g., the following ASP scripts list all configured accounts: /usrmgr/userList.asp
/usrmgr/userStatusList.asp

Proof of concept:



userStatusList.asp outputs the following XML data for every account: <f1>id</f1> <f2>name</f2> <f3>firstName</f3> <f4>lastName</f4> <f5>active</f5> <f6>server</f6> <f7>username</f7

userList.asp additionally lists the configured timezone instead of the server address.

As the login name is known now an attacker can guess/brute force every account and check for weak passwords.

3) Unauthenticated user account deactivation denial of service

It is possible to deny access to the system for every user account. The script "userList.asp" also has the functionality to update the accounts. An unauthenticated attacker can change the login name, first name, last name and time zone settings. One can also change the "active" dropdown to "false" which deactivates the account.

By changing the login name to an empty value it is possible to hide the user. Only the id will show up in the overview page. One can still login with this username and the associated password.

Proof of concept:



The following URL shows the update page of the user with id 42: http://$host/usrmgr/userList.asp?action=update&userid=42

4) Cross site scripting

It is possible to conduct cross site scripting attacks as input is not properly filtered in many scripts. Not all scripts were tested, hence it is likely that there are many more vulnerable scripts.

Proof of concept:


http://$host/de/pda/dev_logon.asp?username=<script>alert(42)</script>&password= http://$host/usrmgr/registerAccount.asp (all fields) http://$host/de/create_account.asp
[...]

Vulnerable versions:


The following versions were found to be vulnerable:
* 6.4.31.2

  • 6.6.0.107
  • 6.6.2.2

Other versions of Nokia products have not been tested and may be vulnerable too!

Nokia Austria support says they are not responsible for the tested Groupwise bundle edition and redirected us to Novell. During a short test we discovered that Nokia Intellisync Wireless Email Express seems to be partially vulnerable too.

Vendor contact timeline:


2007-03-19: vendor (Nokia/Intellisync) notified via email

            (mobile.business.emea@nokia.com) 2007-03-20: no reply hence email to: sales@intellisync.com,

            software.marketing@nokia.com, webmaster@intellisync.com 2007-03-20: sales replies and forwards to support@intellisync.com 2007-03-20: sending advisory draft to support@intellisync.com 2007-03-21: Nokia Austria support calls and needs more information (because they didn't get the advisory) 2007-03-23: Nokia Austria support says the product is a bundle version from Novell and they should be contacted 2007-03-23: contacted Novell regarding the issues (security@novell.com) 2007-03-27: Novell anwsered, SR # 10328518153 has been created 2007-03-28: SR updated, vulnerability should be handled by Nokia 2007-04-02: asking about the status again 2007-04-10: SR updated, "Nokia is looking into the issue" 2007-04-17: Nokia ticket has been opened, no word on it 2007-04-20: Nokia tested "GMS 2" where the issues are not reproduceable

Due to the lack of a "GMS 2" installation it couldn't be verified whether the issues have been resolved by Nokia. It is also unknown whether there's a newer version of Wireless Email Express that is not affected or whether there are more vulnerable Nokia products/versions.

Solution:



According to Nokia "GMS 2" is not affected, hence an upgrade is advised.

Workaround:



restrict access to /usrmgr/ and manually upgrade Tomcat if possible.

Advisory URL:



http://www.sec-consult.com/289.html

SEC Consult Unternehmensberatung GmbH

Office Vienna
Blindengasse 3
A-1080 Wien
Austria Tel.: +43 / 1 / 890 30 43 - 0 Fax.: +43 / 1 / 890 30 43 - 25 Mail: research at sec-consult dot com
www.sec-consult.com

SEC Consult conducts periodical information security workshops on ISO 27001/BS 7799 in cooperation with BSI Management Systems. For more information, please refer to http://www.sec-consult.com/236.html

EOF Johannes Greil / @2007



Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/