VMware patches security flaws leading to RCE in SD-WAN Orchestrator
Limited Time Offer!
For Less Than the Cost of a Starbucks Coffee, Access All DevOpsSchool Videos on YouTube Unlimitedly.
Master DevOps, SRE, DevSecOps Skills!
Source:-https://portswigger.net
VMware has fixed vulnerabilities in its VeloCloud SD-WAN Orchestrator that, chained together, can lead to unauthenticated remote code execution (RCE).
Researchers from Realmode Labs combined authentication bypass, SQL injection, and directory traversal vulnerabilities to leave arbitrary JavaScript running in node.js.
The revelation marks the conclusion of a blog series documenting potentially calamitous RCE chains in four SD-WAN products from major vendors.
Centrally controlling an enterpriseâs network topology, SD-WAN (Software-defined Wide Area Network) products represent âa crucial single point of failure from a security perspectiveâ, Ariel Tempelhof, co-founder and CEO of Tel Aviv-based Realmode Labs, said in a blog post mapping the VMware RCE chain.
Pass the hash
VeloCloud, which was acquired by VMware in 2017, made âtwo grave mistakesâ in implementing the password reset process that paved the way to an authentication bypass.
First, they used the userâs hashed password for the reset key âinstead of generating random bytesâ.
Second, while they implemented âan encrypted, signed tokenâ, they âalso added an option to use an unsigned cleartext [token] using the {CLEAR} prefixâ.
VeloCloud also added predefined backdoor users, a âpractice weâve seen less of in the past yearsâ, albeit disabled by default.
A âPass The Hash Attackâ therefore allowed researchers âto use the hashed password during the password reset procedure, which also reenables the userâ.
Researchers were thus able to reset the highest privilege, super@velocloud.net account, having obtained the accountâs hashed password and logicalId parameter from the installation files.
The non-blind SQL injection vulnerability, meanwhile, arose because user-controlled data was âconcatenated to an SQL query without escaping any charactersâ.
The blog post also explains how the researchers found the directory traversal flaw, which enabled them to âexecute almost any JavaScript file on the local disk.â
Finally, uploaded files which failed content verification were not being deleted, meaning their randomly generated filename could be retrieved from the logger module because VeloCloud allowed users to set the deviceâs syslog server.
Startup insecurity
The flaws were reported to VMware at the end of July, said Tempelhof.
VMware then issued a security advisory on November 18 that addressed six CVEs emanating from Realmode Labsâ research and advised customers to update to versions 4.0.1, 3.4.4, or 3.3.2.
âVMwareâs SIRT team was very responsive,â Tempelhof told The Daily Swig, although their decision not to assign âcriticalâ classifications, despite being presented with the RCE exploit, suggested they had âunderestimated these issuesâ, he claimed.
Tempelhof noted that many SD-WAN products were first developed by startups that were later acquired by large companies â Silver Peak by HPE, Viptela by Cisco, VeloCloud by VMware, and Talari, whose codebase is apparently partly shared with Citrix, by Oracle.
âStartup companies usually put less emphasis on securing their products,â he said. âThey need to build a system from scratch, they have tight development schedules, code is often left unreviewed, and sometimes shortcuts are made.â
Tempelhof told The Daily Swig that he and co-researcher Yaar Hahn were left âwondering what was the security assessment due diligence during this transition [to new ownership for the vendors researched] (if any)â.
The bugs leading to RCE in VMware SD-WAN Orchestrator, Ciscoâs Viptela vManage, and, as reported by The Daily Swig, Citrixâs SD-WAN Center and Silver Peakâs Unity Orchestrator, âcould have been found and fixed by a standard security reviewâ, added Tempelhof.