Re: Weak password protection in WebSphere 4.0.4 XML configuration export

From: Arun Kumar (akumarat_private)
Date: Thu Feb 06 2003 - 11:30:14 PST

  • Next message: Michael Wojcik: "RE: Observation on randomization/rebiasing..."

    
     ('binary' encoding is not supported, stored as-is)
    In-Reply-To: <3E3F9426.4080204at_private>
    
    This is not a new revelation. Most Websphere customers should be and 
    indeed are aware of the encoded (as opposed to encrypted) passwords. We 
    even document this fact in our Infocenter... 
    http://www7b.software.ibm.com/wsdd/WASInfoCenter/infocenter/wass_content/05
    0101.html  .....
    
    "
    Several of the WebSphere configuration files contain user IDs and 
    passwords. These are needed at run time to access external secure 
    resources such as databases. Passwords are encoded, not encrypted, to 
    deter casual observation of sensitive information. Password encoding 
    combined with proper operating system file system security is intended to 
    protect the passwords stored in these files. "
    
    Arun Kumar
    IBM
    WebSphere Customer Support.
    
    >Received: (qmail 24724 invoked from network); 4 Feb 2003 17:07:43 -0000
    >Received: from outgoing3.securityfocus.com (205.206.231.27)
    >  by mail.securityfocus.com with SMTP; 4 Feb 2003 17:07:43 -0000
    >Received: from lists.securityfocus.com (lists.securityfocus.com 
    [205.206.231.19])
    >	by outgoing3.securityfocus.com (Postfix) with QMQP
    >	id 0720AA30ED; Tue,  4 Feb 2003 09:48:15 -0700 (MST)
    >Mailing-List: contact bugtraq-helpat_private; run by ezmlm
    >Precedence: bulk
    >List-Id: <bugtraq.list-id.securityfocus.com>
    >List-Post: <mailto:bugtraqat_private>
    >List-Help: <mailto:bugtraq-helpat_private>
    >List-Unsubscribe: <mailto:bugtraq-unsubscribeat_private>
    >List-Subscribe: <mailto:bugtraq-subscribeat_private>
    >Delivered-To: mailing list bugtraqat_private
    >Delivered-To: moderator for bugtraqat_private
    >Received: (qmail 24317 invoked from network); 4 Feb 2003 10:19:58 -0000
    >Message-ID: <3E3F9426.4080204at_private>
    >Date: Tue, 04 Feb 2003 11:21:26 +0100
    >From: "Jan P. Monsch" <jan.monschat_private>
    >User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.0rc3) 
    Gecko/20020523
    >X-Accept-Language: en-us, en
    >To: Bugtraq <bugtraqat_private>
    >Subject: Weak password protection in WebSphere 4.0.4 XML configuration 
    export
    >Content-Type: text/plain; charset=us-ascii; format=flowed
    >Content-Transfer-Encoding: 7bit
    >
    >#############################################################
    >#
    ># COMPASS SECURITY                        http://www.csnc.ch/
    >#
    >#############################################################
    >#
    ># Topic:        WebSphere Advanced Server Edition 4.0.4
    ># Subject:      Insufficient Password Protection in
    >#               Configuration Export
    ># Author:       Jan P. Monsch
    ># Date:         February 3, 2003
    >#
    >#############################################################
    >
    >Problem:
    >--------
    >Passwords in WebSphere XML configruation export are not sufficiently
    >protected. If the exported configuration gets into the hands of a
    >malicous user, he or she can deobfuscated passworts easily and can gain
    >access to the password protected resources.
    >
    >
    >Workaround:
    >-----------
    >Administrators should take care that they export the configuration to an
    >administrator accessible directory only and destroy the export file
    >after use.
    >
    >
    >Vulnerable:
    >-----------
    >- WebServer Advanced Server 4.0.4
    >- other versions might be vulnerable as well
    >
    >
    >Not vulnerable:
    >---------------
    >- Unknown
    >
    >
    >Details:
    >--------
    >WebSphere Advanced Server Edition 4.0.4 offers a management 
    >functionality which allows an administrator to export the whole 
    >WebSphere configuration as an XML file. The export includes passwords 
    >needed for accessing keying material and data sources:
    >
    >      <jdbc-driver action="update" name="Sample DB Driver">
    >...
    >              <config-properties>
    >                  <property name="serverName" value=""/>
    >                  <property name="password" value="{xor}KD4sa28="/>
    >                  <property name="portNumber" value=""/>
    >                  <property name="databaseName" value="was40"/>
    >                  <property name="user" value="was40"/>
    >                  <property name="disable2Phase" value="true"/>
    >                  <property name="ifxIFXHOST" value=""/>
    >                  <property name="URL" value=""/>
    >                  <property name="informixLockModeWait" value=""/>
    >              </config-properties>
    >          </data-source>
    >
    >
    >These passwords are obfuscated and Base64Encoded. Those areas obfuacated 
    >are marked with the {XOR}-prefix.
    >
    >
    >The obfuscation algorithm is as follows:
    >- CHARobfuscated(n) = CHARpassword(n) XOR CHAR("_"),where n is the 
    >position of the character
    >- ObfuscatedPasswordBase64Encoded = Base64Encode(ObfuscatedPassword)
    >
    >
    >Deobfuscation process:
    >- ObfuscatedPassword = Base64Decode(ObfuscatedPasswordBase64Encoded)
    >- CHARpassword(n) = CHARobfuscated(n) XOR CHAR("_")
    >
    >
    >Regards Jan
    >
    >
    >-- 
    >_____________________________________________________________
    >Jan P. Monsch
    >Compass Security Network Computing AG, CSNC
    >
    >   Tel: +41 55 214 41 67
    >   Fax: +41 55 214 41 61
    >
    >E-mail:     jan.monschat_private
    >Web site:   http://www.csnc.ch/
    >
    >"Security Review - Penetration Testing"
    >_____________________________________________________________
    >
    >
    >
    



    This archive was generated by hypermail 2b30 : Thu Feb 06 2003 - 11:56:22 PST