Upgrade & Secure Your Future with DevOps, SRE, DevSecOps, MLOps!
We spend hours on Instagram and YouTube and waste money on coffee and fast food, but wonβt spend 30 minutes a day learning skills to boost our careers.
Master in DevOps, SRE, DevSecOps & MLOps!
Learn from Guru Rajesh Kumar and double your salary in just one year.
Source:-https://portswigger.net
VMware has fixed vulnerabilities in its VeloCloud SD-WAN Orchestrator that, chained together, can lead to unauthenticated remote code execution (RCE).
Researchers from Realmode Labs combined authentication bypass, SQL injection, and directory traversal vulnerabilities to leave arbitrary JavaScript running in node.js.
The revelation marks the conclusion of a blog series documenting potentially calamitous RCE chains in four SD-WAN products from major vendors.
Centrally controlling an enterpriseβs network topology, SD-WAN (Software-defined Wide Area Network) products represent βa crucial single point of failure from a security perspectiveβ, Ariel Tempelhof, co-founder and CEO of Tel Aviv-based Realmode Labs, said in a blog post mapping the VMware RCE chain.
Pass the hash
VeloCloud, which was acquired by VMware in 2017, made βtwo grave mistakesβ in implementing the password reset process that paved the way to an authentication bypass.
First, they used the userβs hashed password for the reset key βinstead of generating random bytesβ.
Second, while they implemented βan encrypted, signed tokenβ, they βalso added an option to use an unsigned cleartext [token] using the {CLEAR} prefixβ.
VeloCloud also added predefined backdoor users, a βpractice weβve seen less of in the past yearsβ, albeit disabled by default.
A βPass The Hash Attackβ therefore allowed researchers βto use the hashed password during the password reset procedure, which also reenables the userβ.
Researchers were thus able to reset the highest privilege, super@velocloud.net account, having obtained the accountβs hashed password and logicalId parameter from the installation files.
The non-blind SQL injection vulnerability, meanwhile, arose because user-controlled data was βconcatenated to an SQL query without escaping any charactersβ.
The blog post also explains how the researchers found the directory traversal flaw, which enabled them to βexecute almost any JavaScript file on the local disk.β
Finally, uploaded files which failed content verification were not being deleted, meaning their randomly generated filename could be retrieved from the logger module because VeloCloud allowed users to set the deviceβs syslog server.
Startup insecurity
The flaws were reported to VMware at the end of July, said Tempelhof.
VMware then issued a security advisory on November 18 that addressed six CVEs emanating from Realmode Labsβ research and advised customers to update to versions 4.0.1, 3.4.4, or 3.3.2.
βVMwareβs SIRT team was very responsive,β Tempelhof told The Daily Swig, although their decision not to assign βcriticalβ classifications, despite being presented with the RCE exploit, suggested they had βunderestimated these issuesβ, he claimed.
Tempelhof noted that many SD-WAN products were first developed by startups that were later acquired by large companies β Silver Peak by HPE, Viptela by Cisco, VeloCloud by VMware, and Talari, whose codebase is apparently partly shared with Citrix, by Oracle.
βStartup companies usually put less emphasis on securing their products,β he said. βThey need to build a system from scratch, they have tight development schedules, code is often left unreviewed, and sometimes shortcuts are made.β
Tempelhof told The Daily Swig that he and co-researcher Yaar Hahn were left βwondering what was the security assessment due diligence during this transition [to new ownership for the vendors researched] (if any)β.
The bugs leading to RCE in VMware SD-WAN Orchestrator, Ciscoβs Viptela vManage, and, as reported by The Daily Swig, Citrixβs SD-WAN Center and Silver Peakβs Unity Orchestrator, βcould have been found and fixed by a standard security reviewβ, added Tempelhof.