{"id":17048,"date":"2021-09-13T15:57:13","date_gmt":"2021-09-13T13:57:13","guid":{"rendered":"https:\/\/herolab.usd.de\/?page_id=17048"},"modified":"2021-09-13T17:04:27","modified_gmt":"2021-09-13T15:04:27","slug":"usd-2021-0015","status":"publish","type":"page","link":"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2021-0015\/","title":{"rendered":"usd-2021-0015"},"content":{"rendered":"\n[et_pb_section fb_built=\"1\" _builder_version=\"4.9.4\" _module_preset=\"default\" background_color=\"#2E353D\" custom_padding=\"||0px|||\" global_colors_info=\"{}\"][et_pb_row _builder_version=\"4.9.4\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.9.4\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.9.4\" _module_preset=\"cc5ac6f4-ebbd-4b3f-bc92-4dfc1f15fe2c\" global_colors_info=\"{}\" custom_padding=\"||0px|||\"]<h1>usd-2021-0015 | Password Manager Pro<\/h1>\n<p><span><\/span><br \/><strong>Advisory ID<\/strong><span>: usd-2021-0015<br \/><\/span><strong>CVE Number<\/strong>: CVE-2021-33617<strong><br \/>Affected Product<\/strong><span>: Password Manager Pro<\/span><br \/><strong>Affected Version<\/strong><span>: &lt; Version 11.2 Build 11200 (Major)<\/span><br \/><strong>Vulnerability Type<\/strong><span>: User Enumeration (CWE-203: Observable Discrepancy)<\/span><br \/><strong>Security Risk<\/strong><span>: Low<\/span><br \/><strong>Vendor URL<\/strong>: <a href=\"https:\/\/www.tibco.com\" target=\"_blank\" rel=\"noopener\"><span><\/span><\/a><a href=\"https:\/\/www.manageengine.com\/products\/passwordmanagerpro\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.manageengine.com\/products\/passwordmanagerpro\/\u00a0<\/a><br \/><strong>Vendor Status<\/strong><span>: Fixed<\/span><em><\/em><\/p>\n<p><span><\/span><\/p>\n<h3>Description<\/h3>\n<p>The ManageEngine Password Manager Pro web application allows the determination of valid logon names. This can be achieved by passing either an existing or non-existing user name to the application and view its corresponding response.<\/p>\n<p>User Enumeration vulnerabilities occur if observable discrepancies of an application\u2019s behavior allow to determine whether an user account is existent within an application. Such vulnerabilities can be often exploited to generate a list of valid logon names, potentially acting as foothold for further attacks.<\/p>\n<p>The <em>Password Manager Pro<\/em> exposes an endpoint that enables an unauthenticated malicious actor to determine whether an <em>userName<\/em>\u00a0is existent within the application.<\/p>\n<p><span><\/span><\/p>\n<h3>Proof of Concept (PoC)<\/h3>\n<p>The <em>Password Manager Pro<\/em> exposes an endpoint that responds with different contents if a <em>userName<\/em>\u00a0parameter at <a href=\"https:\/\/example.com\/login\/AjaxResponse.jsp?RequestType=GetUserDomainName&amp;userName=[VALUE]\" target=\"_blank\" rel=\"noopener\">https:\/\/example.com\/login\/AjaxResponse.jsp?RequestType=GetUserDomainName&amp;userName=[VALUE]<\/a> holds an existing user name or not.<\/p>\n<p>1. Non-existent user: <a href=\"https:\/\/example.com\/login\/AjaxResponse.jsp?RequestType=GetUserDomainName&amp;userName=non.existent\" target=\"_blank\" rel=\"noopener\">https:\/\/example.com\/login\/AjaxResponse.jsp?RequestType=GetUserDomainName&amp;userName=non.existent<\/a><\/p>[\/et_pb_text][et_pb_image src=\"https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2021\/09\/poc1-1024x73-1.png\" _builder_version=\"4.10.7\" _module_preset=\"default\" title_text=\"poc1-1024x73\" hover_enabled=\"0\" sticky_enabled=\"0\"][\/et_pb_image][et_pb_text _builder_version=\"4.10.7\" _module_preset=\"default\" hover_enabled=\"0\" sticky_enabled=\"0\"]<p>2.Existing user: <a href=\"https:\/\/example.com\/login\/AjaxResponse.jsp?RequestType=GetUserDomainName&amp;userName=max.mustermann\" target=\"_blank\" rel=\"noopener\">https:\/\/example.com\/login\/AjaxResponse.jsp?RequestType=GetUserDomainName&amp;userName=max.mustermann<\/a><\/p>[\/et_pb_text][et_pb_image src=\"https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2021\/09\/poc2-1024x75-1.png\" _builder_version=\"4.10.7\" _module_preset=\"default\" title_text=\"poc2-1024x75\" hover_enabled=\"0\" sticky_enabled=\"0\"][\/et_pb_image][et_pb_text _builder_version=\"4.9.11\" _module_preset=\"cc5ac6f4-ebbd-4b3f-bc92-4dfc1f15fe2c\" global_colors_info=\"{}\" custom_padding=\"||1px|||\"]<div class=\"e16902-22 x-container max width\">\n<div class=\"e16902-23 x-column x-sm x-1-1\">\n<h3>Fix<\/h3>\n<div>\n<div class=\"x-text\">\n<p>It is recommended to use generic error messages that do not allow to draw conclusions about logon names.<\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<\/div>\n<div><\/div>\n<h3>References<\/h3>\n<ul>\n<li><a href=\"https:\/\/www.tibco.com\/de\/products\/tibco-businessworks\" target=\"_blank\" rel=\"noopener\"><\/a><a href=\"https:\/\/cwe.mitre.org\/data\/definitions\/203.html\" target=\"_blank\" rel=\"noopener\">https:\/\/cwe.mitre.org\/data\/definitions\/203.html<\/a><a href=\"https:\/\/www.tibco.com\/de\/products\/tibco-businessworks\" target=\"_blank\" rel=\"noopener\"><\/a><\/li>\n<li><a href=\"https:\/\/www.gnucitizen.org\/blog\/username-enumeration-vulnerabilities\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.gnucitizen.org\/blog\/username-enumeration-vulnerabilities\/<\/a><a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2018-10054\" target=\"_blank\" rel=\"noopener\"><\/a><\/li>\n<\/ul>\n<h3><\/h3>\n<h3>Timeline<\/h3>\n<ul>\n<li>2021-04-01: This vulnerability was identified by Marcus Nilsson.<\/li>\n<li>2021-04-15: Advisory submitted to vendor via e-mail.<\/li>\n<li>2021-05-28: CVE-2021-33617 is assigned<\/li>\n<li>2021-07-07: Security fix is released with <a href=\"https:\/\/www.manageengine.com\/products\/passwordmanagerpro\/release-notes.html\" target=\"_blank\" rel=\"noopener\">Version 11.2 Build 11200<\/a>: <em>\u201eA user enumeration issue has been fixed\u201c.<\/em><\/li>\n<li>2021-07-30: Security advisory released by usd AG.<\/li>\n<\/ul>\n<h3><\/h3>\n<h3>Credits<\/h3>\n<p>This security vulnerability was found by Marcus Nilsson of usd AG.<\/p>\n<\/div>\n<\/div>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]\n","protected":false},"excerpt":{"rendered":"<p>usd-2021-0015 | Password Manager Pro Advisory ID: usd-2021-0015CVE Number: CVE-2021-33617Affected Product: Password Manager ProAffected Version: &lt; Version 11.2 Build 11200 (Major)Vulnerability Type: User Enumeration (CWE-203: Observable Discrepancy)Security Risk: LowVendor URL: https:\/\/www.manageengine.com\/products\/passwordmanagerpro\/\u00a0Vendor Status: Fixed Description The ManageEngine Password Manager Pro web application allows the determination of valid logon names. This can be achieved by passing either [&hellip;]<\/p>\n","protected":false},"author":99,"featured_media":0,"parent":16124,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"class_list":["post-17048","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/17048","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/users\/99"}],"replies":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/comments?post=17048"}],"version-history":[{"count":0,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/17048\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/16124"}],"wp:attachment":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/media?parent=17048"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}