IBM Cognos Business Intelligence Developer 10.2.1 (backURL) Open Redirect

2015-05-24T00:00:00
ID ZSL-2015-5244
Type zeroscience
Reporter Gjoko Krstic
Modified 2015-05-24T00:00:00

Description

Title: IBM Cognos Business Intelligence Developer 10.2.1 (backURL) Open Redirect
Advisory ID: ZSL-2015-5244
Type: Local/Remote
Impact: Spoofing
Risk: (2/5)
Release Date: 24.05.2015

Summary

IBM Cognos Business Intelligence is a web-based, integrated business intelligence suite by IBM. It provides a toolset for reporting, analysis, scorecarding, and monitoring of events and metrics. The software consists of several components to meet the different information requirements in a company.

Description

Input passed via the 'backURL' GET parameter in '/p2pd/servlet/dispatch' is not properly verified before being used to redirect users. This can be exploited to redirect a user to an arbitrary website e.g. when a user clicks a specially crafted link to the affected script hosted on a trusted domain.

Vendor

IBM Corporation - <http://www.ibm.com>

Affected Version

10.2.1 (Build 10.2.5000.267) Trial

Tested On

Microsoft Windows 7 Ultimate SP1 (EN)
Apache-Coyote/1.1
Apache Tomcat/6.0.35

Vendor Status

[22.04.2015] Vulnerability discovered.
[23.04.2015] Vendor contacted.
[23.04.2015] Vendor sends instructions for reporting security vulnerability.
[28.04.2015] Submitted details to vendor thru online form.
[29.04.2015] Vendor confirms submission assigning internal PSIRT Advisory ID 3198.
[05.05.2015] Asked vendor for status update.
[05.05.2015] Vendor is currently analyzing the issue.
[11.05.2015] Working with the vendor.
[15.05.2015] Vendor states that the issue is present only if the CAF (Cognos Application Firewall) is disabled (disabled by default in trial version).
[15.05.2015] Asked vendor to reconsider to create input validation strategy like whitelisting because application firewalls might not cover all vectors.
[18.05.2015] Vendor does not consider this an issue.
[19.05.2015] Mutual agreement with the vendor.
[28.05.2015] Public security advisory released.

PoC

cognos_url.txt

Credits

Vulnerability discovered by Gjoko Krstic - <gjoko@zeroscience.mk>

References

[1] <https://packetstormsecurity.com/files/132078>
[2] <http://www.securityfocus.com/bid/74907>

Changelog

[28.05.2015] - Initial release
[01.06.2015] - Added reference [1] and [2]

Contact

Zero Science Lab

Web: <http://www.zeroscience.mk>
e-mail: lab@zeroscience.mk

                                        
                                            
IBM Cognos Business Intelligence Developer 10.2.1 (backURL) Open Redirect


Vendor: IBM Corporation
Product web page: http://www.ibm.com
Affected version: 10.2.1 (Build 10.2.5000.267) Trial

Summary: IBM Cognos Business Intelligence is a web-based, integrated
business intelligence suite by IBM. It provides a toolset for reporting,
analysis, scorecarding, and monitoring of events and metrics. The software
consists of several components to meet the different information requirements
in a company.

Desc: Input passed via the 'backURL' GET parameter in '/p2pd/servlet/dispatch'
is not properly verified before being used to redirect users. This can be
exploited to redirect a user to an arbitrary website e.g. when a user clicks
a specially crafted link to the affected script hosted on a trusted domain.

Tested on: Microsoft Windows 7 Ultimate SP1 (EN)
           Apache-Coyote/1.1
           Apache Tomcat/6.0.35


Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
                            @zeroscience


Advisory ID: ZSL-2015-5244
Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5244.php


22.04.2015

--


http://169.254.17.10:19300/p2pd/servlet/dispatch?b_action=xts.run&backURL=http://zeroscience.mk&m_path=CAMID("CognosExpress:administrator")/folder[@name='My Folders']&m=portal/submit.xts&ifrmcmd=delete