Synopsis
While researching CVE-2017-4997, Tenable discovered the default account "smc:smc" in the EMC VASA Virtual Appliance SE web application. We also quickly discovered that this account is not authorized to access the web interface:
2017-07-27 20:44:01,237 INFO [em.bp.SECURITY] (default task-14) com.emc.em.common.security.authentication.Authenticator:User C:aceeca79-53d7-49ee-bfb8-0d425579597f\smc has successfully logged in 2017-07-27 20:44:01,344 INFO [com.emc.se.utils] (default task-14) smc User Not Authorized
However, if you read the error log closely you'll see the initial login process was successful. An attacker can use this account to login and obtain a valid session ID:
[user@host inp]$ curl --tlsv1.2 -ki -d "user=smc&passwd=smc" "https://:5480/SE/app" HTTP/1.1 200 OK Expires: Thu, 01 Jan 1970 00:00:00 GMT X-Powered-By: JSP/2.2 Set-Cookie: JSESSIONID=ubTvlGp-9jsCBy48a0GiQzW0Myly5BX9f2SaZoim.record; path=/SE; secure; HttpOnly [...]
The session ID is the cookie's JSESSIONID without the .hostname string. In the above example the hostname was record. Therefore the session ID is 9jsCBy48a0GiQzW0Myly5BX9f2SaZoim. With a valid session ID the attacker can perform many authenticated functions without interacting with the vApp Manager web interface.
Tenable further discovered that CVE-2017-4997 was not completely fixed. The "fix" did not stop authenticated users from uploading files to arbitrary locations. An attacker could login with the "smc" account and upload a JSP shell.
Solution
Follow the upgrade advice provided by EMC's advisory.Disclosure Timeline
All information within TRA advisories is provided “as is”, without warranty of any kind, including the implied warranties of merchantability and fitness for a particular purpose, and with no guarantee of completeness, accuracy, or timeliness. Individuals and organizations are responsible for assessing the impact of any actual or potential security vulnerability.
Tenable takes product security very seriously. If you believe you have found a vulnerability in one of our products, we ask that you please work with us to quickly resolve it in order to protect customers. Tenable believes in responding quickly to such reports, maintaining communication with researchers, and providing a solution in short order.
For more details on submitting vulnerability information, please see our Vulnerability Reporting Guidelines page.
If you have questions or corrections about this advisory, please email [email protected]