European Security Services GPS v1.0 - Multiple Vulnerabilities

From: research@vulnerability-lab.com <research@vulnerability-lab.com>
To: full-disclosure@lists.grok.org.uk,submissions@packetstormsecurity.org,bugs@securitytracker.com,bugtraq@securityfocus.com
Cc:
Subject: European Security Services GPS v1.0 - Multiple Vulnerabilities
Date:


Title:
======
European Security Services GPS 1.x - Multiple Vulnerabilities


Date:
=====
2011-09-28



VL-ID:
=====
63


Reference:
==========
http://www.vulnerability-lab.com/get_content.php?id=63


Introduction:
=============
Fr eine geringe Ortungsgebhr erhalten Sie einen Zugang zu unserem
Online Control Center. Nach erfolgreichem Login
stehen Ihnen Nachfolgende einstellungsmglichkeiten und Daten zur
Verfgung. Dieses ermglicht Ihnen z.B.:

- Punkt genaue Fahrstrecken Analyse
- Geschwindigkeitsangabe
- Tagesbericht
- Monatsbericht
- Geo-Fenster
- Real-Time Verfolgung
- Datensicherung 24 Monate
- 2D/3D Ansicht
- Ortung bis auf Hausnummer Ebene
- Adress Angabe
- Daten-Download (CSV)
- Adress-Suche

Dank der modernsten Technik sind wir heute im Stande mit diesen
Gegebenheiten auch fr mehr Sicherheit zu sorgen.
Mit unserer Technik haben Sie die Mglichkeit z.B. Personen, Tiere,
Fahrzeuge, Container, Waren, Schiffe usw.
Weltweit bis auf 2 Meter genau zu orten. Zustzlich stehen Ihnen noch
zahllose weitere Mglichkeiten zur Verfgung.
Sie knnen Beispielsweise Online in unserem H.E.S.S. Control Center
beobachten wie in Real time Ihr Kind morgens
zur Schule geht oder Ihre Ware in Japan vom Schiff geladen wird. Dem
Einsatzspektrum sind keine Grenzen gesetzt.
Einsatzbeispiele:


Fr Privatkunden
    Kinderortung - z.B. auf dem Nachhauseweg Abends vom Training im Verein
    Senioren - z.B. fr senile ltere Personen die sich schnell Verlaufen
    Sportler - z.B. fr Bergwanderer, Skifahrer oder Extremsportler die
schnell in Gefahr kommen
    Kfz Ortung / Diebstahlschutz - z.B. zur Kfz widerbeschaffung nach
einem Diebstahl
    Tiere - z.B. fr Weidetiere oder Pferde

Fr Gewerbliche Kunden
    Kfz Ortung / Diebstahlschutz - z.B. zur Fahrer- / Routenkontrolle
Ihrer Fahrzeuge
    Baumaschinen - z.B. zur Absicherung Ihrer Baumaschinen auf Baustellen
    Sicherheitsunternehmen - z.B. zur Observation / Detektivarbeiten
    Speditionen - z.B. zur berwachung der Lieferungen bzw. Transport
berwachung
    Alten- und Krankenpflege - z.B. zur berwachung ltere Personen die
sich schnell Verlaufen
    Leasinggesellschaften - z.B. zur Kontrolle und berwachung Ihrer
Leasing Produkte
    Taxiunternehmen - z.B. zur Koordinierung in der Taxizentrale / zur
Sicherung der Fahrer
    Fahrschulen - z.B. zur Fahrtroutenanalyse und zu Trainingszwecken
    Behrden - z.B. zur berwachung von Personen und Fahrzeugen

(Copy of the Vendor Homepage:
http://www.hess-security.de/das_control_center.html)


Abstract:
=========
The Vulnerability-Lab Team discovered multiple Web Vulnerabilities on
the gps tracking system of (EES) European Security Services.


Report-Timeline:
================
2011-03-02:    Vendor Notification
2011-04-08:    Vendor Response/Feedback
2011-**-**:    Vendor Fix/Patch
2011-09-28:    Public or Non-Public Disclosure


Status:
========
Published


Affected Products:
==================
European Security Services GPS v1.0


Exploitation-Technique:
=======================
Remote


Severity:
=========
Critical


Details:
========
1.1
An Integer Overflow vulnerability is detected on the gps tracking system
of (EES) European Security Services.
The calender application module allows an attacker to crash the
applikation service via integer overflow bug.

Vulnerable Module(s):
                    [+] Calender

--- Exception Logs ---
System.Overflow:
Arithmetic operation resulted in an overflow.
at Microsoft.VisualBasic.CompilerServices.IntegerType.FromString(String
Value)
at findMe.showData.Page_Load(Object sender, EventArgs e)
at System.Web.UI.Control.OnLoad(EventArgs e)
at System.Web.UI.Control.LoadRecursive()
at System.Web.UI.Page.ProcessRequestMain(Boolean
includeStagesBeforeAsyncPoint, Boolean includeStagesAfterAsyncPoint)




1.2
Multiple persistent input validation vulnerabilities are detected on the
gps tracking system of (EES) European Security Services.
The vulnerability allows an local low privileged user account to
inject/implement malicious persistent script codes on application

side.
Successful exploitation of the vulnerability can result in session
hijacking or content request manipulation.

Vulnerable Module(s): (Persistent)
                    [+] Userdata Form allows
                    [+] Group Administration & Track ID
                    [+] User Password CSRF + Reset


1.2.1
Another vulnerability is located on the session handling of the gps
tracking system of (EES) European Security Services.
The passwords got transfered in plain via session cookie. Successful
exploitation can result in session hijacking without high
required user inter action.

Vulnerable Module(s):
                    [+] Session Handling


1.3
Attacker can bypass the auth of the login form. The vulnerability allows
remote attackers to access the
admin control panel without authorization.

Vulnerable Module(s):
                    [+] Login


Proof of Concept:
=================
1.1

Reference(s):

File(s):   showdata.aspx
Param(s):  ?name=noacct&month=8&year=
Param(s):  ?name=noacct&month=


PoC:
Insert the following example string on the calender month parameter ...
-9999999999999999999999999999999


1.2

Note: To reproduce the persistent vulnerabilities inject/implement own
java or html script code on the affected vulnerable input

section.


1.2.1
URL=http://xxx.de/vemap.aspx?name=remove&gpasswd=mypasstest

<center>
<p><br><br>
<div id="LOGIN" >
<form action="" name="loginform">
<INPUT TYPE="TEXT" NAME="user" VALUE="remove" CLASS="LOGINFORM">
<INPUT TYPE="PASSWORD" NAME="passwort" Value="mypasstest" CLASS="LOGINFORM">
<INPUT TYPE="BUTTON" NAME="Login" VALUE="Login" CLASS="LOGINBUTTON"
ONCLICK="getPostData(document.loginform.user.value,document.loginform.passwort.value);"></form>



1.3
PoC:
Username: 'or 1=1--
Password: 'or 1=1--


Risk:
=====
1.1     The security risk of the  client-side arithmetic integer
overflow web vulnerability is estimated as low.
1.2     The security risk of the multiple persistent web vulnerabilities
are estimated as medium(+).
1.2.1  The security risk of the unsecure session handling (plain
transfer) vulnerability is estimated as medium(+).
1.3     The security risk of the login (auth) bypass vulnerability is
estimated as critical.


Credits:
========
Vulnerability Research Laboratory - Benjamin Kunz Mejri (Rem0ve)


Disclaimer:
===========
The information provided in this advisory is provided as it is without
any warranty. Vulnerability-Lab disclaims all warranties,
either expressed or implied, including the warranties of merchantability
and capability for a particular purpose. Vulnerability-
Lab or its suppliers are not liable in any case of damage, including
direct, indirect, incidental, consequential loss of business
profits or special damages, even if Vulnerability-Lab or its suppliers
have been advised of the possibility of such damages. Some
states do not allow the exclusion or limitation of liability for
consequential or incidental damages so the foregoing limitation
may not apply. Any modified copy or reproduction, including partially
usages, of this file requires authorization from

Vulnerability-
Lab. Permission to electronically redistribute this alert in its
unmodified form is granted. All other rights, including the use of
other media, are reserved by Vulnerability-Lab or its suppliers.

                            Copyright  2011|Vulnerability-Lab

-- 
Website: www.vulnerability-lab.com ; vuln-lab.com or vuln-db.com
Contact: admin@vulnerability-lab.com or support@vulnerability-lab.com






Copyright © 1995-2020 LinuxRocket.net. All rights reserved.