ISS Security Brief: PeopleSoft XML External Entities Vulnerability (fwd)

From: Dave Ahmad (daat_private)
Date: Mon Jan 20 2003 - 12:16:51 PST

  • Next message: Marc Slemko: "Re: New Web Vulnerability - Cross-Site Tracing"

    David Mirza Ahmad
    Symantec
    
    0x26005712
    8D 9A B1 33 82 3D B3 D0 40 EB  AB F0 1E 67 C6 1A 26 00 57 12
    
    -----BEGIN PGP SIGNED MESSAGE-----
    
    Internet Security Systems Security Brief
    January 20, 2003
    
    PeopleSoft XML External Entities Vulnerability
    
    Synopsis:
    
    ISS X-Force has discovered a flaw in the PeopleSoft Application Messaging
    Gateway. PeopleSoft enterprise software enables the management of all manner
    of business functions, including human resources, customer relations, supply
    chain, and finance. The PeopleSoft Application Messaging Gateway provides a
    Web-based interface for PeopleSoft functionality and allows for communication
    and synchronization between PeopleSoft products non-PeopleSoft products.
    
    Impact:
    
    The Application Messaging Gateway is configured to run by default on the
    PeopleSoft Web server, and is accessible as a Java servlet. Attackers can use
    an XML External Entities (XXE) attack to read any file on the vulnerable
    PeopleSoft application server under the security context of the Web server
    process. This attack may lead to the exposure of confidential information
    stored in vulnerable PeopleSoft installations.
    
    Affected Versions:
    
    PeopleTools 8.1x prior to 8.19, included with most PeopleSoft installations,
    including but not limited to:
    
    PeopleSoft HCM (Human Capital Management)
    PeopleSoft CRM (Customer Relationship Management)
    PeopleSoft EPM (Enterprise Performance Management)
    PeopleSoft FMS (Financial Management Solutions)
    PeopleSoft SCM (Supply Chain Management)
    PeopleSoft ESA (Enterprise Server Automation)
    PeopleSoft SRM (Supplier Relationship Management)
    
    Note: PeopleTools 8.4x is not vulnerable.
    
    For the complete ISS X-Force Security Advisory, please visit:
    http://bvlive01.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=21811
    ______
    
    About Internet Security Systems (ISS)
    Founded in 1994, Internet Security Systems (ISS) (Nasdaq: ISSX) is a
    pioneer and world leader in software and services that protect critical
    online resources from an ever-changing spectrum of threats and misuse.
    Internet Security Systems is headquartered in Atlanta, GA, with
    additional operations throughout the Americas, Asia, Australia, Europe
    and the Middle East.
    
    Copyright (c) 2003 Internet Security Systems, Inc. All rights reserved
    worldwide.
    
    Permission is hereby granted for the electronic redistribution of this
    document. It is not to be edited or altered in any way without the
    express written consent of the Internet Security Systems X-Force. If you
    wish to reprint the whole or any part of this document in any other
    medium excluding electronic media, please email xforceat_private for
    permission.
    
    Disclaimer: The information within this paper may change without notice.
    Use of this information constitutes acceptance for use in an AS IS
    condition. There are NO warranties, implied or otherwise, with regard to
    this information or its use. Any use of this information is at the
    user's risk. In no event shall the author/distributor (Internet Security
    Systems X-Force) be held liable for any damages whatsoever arising out
    of or in connection with the use or spread of this information.
    X-Force PGP Key available on MIT's PGP key server and PGP.com's key server,
    as well as at http://www.iss.net/security_center/sensitive.php
    Please send suggestions, updates, and comments to: X-Force
    xforceat_private of Internet Security Systems, Inc.
    
    -----BEGIN PGP SIGNATURE-----
    Version: 2.6.2
    
    iQCVAwUBPiwp0zRfJiV99eG9AQEyAwP/dJYe0RJ0qSMhlQoCnyHrrHDw0Q8jEg6t
    u4pfgy7YG9v3Al+HrLlh7arih4nGg3Y2bJ+MGYAXIcJrQBVjTbRL+i7UUxGwdKuv
    mVp1rUpBCliQ0zSXZqmS6Pvh4RjsutEnsKAMgkxyEhPNww9xeG6Cb+0OnkihUJCg
    KA7vW+/sOKU=
    =8DbE
    -----END PGP SIGNATURE-----
    



    This archive was generated by hypermail 2b30 : Wed Jan 22 2003 - 16:51:18 PST