PeopleSoft ToolsRelease 8.55.03 / ToolsReleaseDB 8.55 / HCM 9.2 XSS

2017-07-21T00:00:00
ID PACKETSTORM:143441
Type packetstorm
Reporter Dmitri Iudin
Modified 2017-07-21T00:00:00

Description

                                        
                                            `1. ADVISORY INFORMATION  
Title: Multiple XSS (POST request) Vulnerabilities in TestServlet (PeopleSoft)  
Advisory ID: [ERPSCAN-17-037]  
Advisory URL: https://erpscan.com/advisories/erpscan-17-037-multiple-xss-vulnerabilities-testservlet-peoplesoft/  
Risk: Medium  
Date published: 18.07.2017  
Vendor contacted: Oracle  
  
2. VULNERABILITY INFORMATION  
Class: XSS [CWE-79]  
Impact: Modify displayed content from a Web site, steal authentication  
information of a user  
Remotely Exploitable: Yes  
Locally Exploitable: Yes  
CVE Name: CVE-2017-10106  
  
CVSS Information  
CVSS Base Score v3: 6.1 / 10  
CVSS Base Vector:  
  
AV: Attack Vector (Related exploit range) Network (N)  
AC: Attack Complexity (Required attack complexity) Low (L)  
PR: Privileges Required (Level of privileges needed to exploit) None (N)  
UI: User Interaction (Required user participation) Required (R)  
S: Scope (Change in scope due to impact caused to components beyond  
the vulnerable component) Changed (C)  
C: Impact to Confidentiality Low (L)  
I: Impact to Integrity Low (L)  
A: Impact to Availability None (N)  
  
3. VULNERABILITY DESCRIPTION  
An attacker can use a special HTTP request to hijack session data of  
administrators or users of the web resource.  
  
4. VULNERABLE PACKAGES  
ToolsRelease: 8.55.03  
ToolsReleaseDB: 8.55  
PeopleSoft HCM 9.2  
  
# Component: com.peoplesoft.pt.portlet.service.test.TestServlet  
  
$ md5sum pspc.war/WEB-INF/classes/com/peoplesoft/pt/portlet/service/test/TestServlet.class  
16634cea4be75869127b76cfc627f894  
pspc.war/WEB-INF/classes/com/peoplesoft/pt/portlet/service/test/TestServlet.class  
  
5. SOLUTIONS AND WORKAROUNDS  
To correct this vulnerability, implement Oracle CPU July 2017  
(http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html)  
  
6. AUTHOR  
Dmitri Iudin aka @ret5et  
  
7. TECHNICAL DESCRIPTION  
7.1. Proof of Concept  
PoC  
"""  
POST /pspc/test?userID=<script>alert(1)</script>&password=<script>alert(2)</script>&languageCode==<script>alert(5)</script>&siteName=<script>alert(3)</script>&CREFName=<script>alert(4)</script>&portalName=<script>alert(6)</script>&command=login  
HTTP/1.1  
Host: 172.16.2.230:8000  
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101  
Firefox/45.0 twitter:@ret5et  
Accept-Encoding: gzip, deflate  
Content-Length: 0  
  
"""  
  
8. REPORT TIMELINE  
reported to the vendor - 2017-01-26  
Date published: 18.07.2017  
  
  
9. ABOUT ERPScan Research  
  
The companyas expertise is based on the research subdivision of  
ERPScan, which is engaged in vulnerability research and analysis of  
critical enterprise applications. It has achieved multiple  
acknowledgments from the largest software vendors like SAP, Oracle,  
Microsoft, IBM, VMware, HP for exposing in excess of 400  
vulnerabilities in their solutions (200 of them just in SAP!).  
  
ERPScan researchers are proud to expose new types of vulnerabilities  
(TOP 10 Web hacking techniques 2012) and were nominated for best  
server-side vulnerability in BlackHat 2013.  
  
ERPScan experts have been invited to speak, present and train at 60+  
prime international security conferences in 25+ countries across the  
continents. These include BlackHat, RSA, HITB as well as private  
trainings for SAP in several Fortune 2000 companies.  
  
ERPScan researchers lead project EAS-SEC, which is focused on  
enterprise application security research and awareness. They have  
published 3 exhaustive annual award-winning surveys about SAP  
Security.  
  
ERPScan experts have been interviewed by leading media resources and  
specialized info-sec publications worldwide, these include Reuters,  
Yahoo, SC Magazine, The Register, CIO, PC World, DarkReading, Heise,  
and Chinabyte to name a few.  
  
We have highly qualified experts in staff with experience in many  
different fields of security, from web applications and  
mobile/embedded to reverse engineering and ICS/SCADA systems,  
accumulating their experience to conduct research in SAP system  
security.  
  
ABOUT ERPScan  
  
ERPScan is one of the most respected and credible Business Application  
Security provider. Founded in 2010, the company operates globally.  
Named as an aEmerging vendora in Security by CRN and distinguished by  
more than 25 other awards - ERPScan is the leading SAP AG partner in  
discovering and resolving security vulnerabilities. ERPScan  
consultants work with SAP AG in Walldorf supporting in improving  
security of their latest solutions.  
  
ERPScanas primary mission is to close the gap between technical and  
business security, and provide solutions to evaluate and secure ERP  
systems and business-critical applications from both, cyber-attacks as  
well as internal fraud. Usually our clients are large enterprises,  
Fortune 2000 companies and managed service providers whose  
requirements are to actively monitor and manage security of vast SAP  
landscapes on a global scale.  
  
Our flagship product is ERPScan Security Monitoring Suite for SAP.  
This multi award-winning innovative software is the only solution in  
the market certified by SAP AG covering all tiers of SAP security i.e.  
vulnerability assessment, source code review and Segregation of  
Duties. The largest companies from across diverse industries like oil  
and gas, banking, retail, even nuclear power installations as well as  
consulting companies have successfully deployed the software. ERPScan  
Monitoring Suite for SAP is specifically designed for enterprise  
systems to continuously monitor changes in multiple SAP systems. It  
generates and analyzes trends on user-friendly dashboards, manages  
risks, tasks and can export results to external systems.These features  
enable central management of SAP system security with minimal time and  
effort.  
  
We use afollow the suna principle and function in two hubs, located in  
the Netherlands and the US to operate local offices and partner  
network spanning 20+ countries around the globe. This enables  
monitoring cyber threats in real time while providing an agile  
customer support.  
  
Address USA: 228 Hamilton Avenue, Fl. 3, Palo Alto, CA. 94301  
Phone: 650.798.5255  
Twitter: @erpscan  
Scoop-it: Business Application Security  
`