PT-2014-04: Single Sign-On Vulnerability in Nixu Namesurfer

Vulnerable software

Nixu Namesurfer
Version: 7.2.2 and earlier

Link:
http://www.nixusoftware.com/our_products_ipam.html

Severity level

Severity level: High
Impact: Unauthorized Access
Access Vector: Remote

CVSS v2:
Base Score: 9.0
Vector: (AV:N/AC:L/Au:S/C:C/I:C/A:C)

CVE: not assigned

Software description

Nixu Namesurfer implements a unified system for manageming DNS servers via web interface.

Vulnerability description

The specialists of the Positive Research center have detected a Single Sign-On vulnerability in Nixu Namesurfer.

All services used by the Nixu Namesurfer software (PostgreSQL, Apache) use the same user account to operate. Therefore, a weakness in one of the services will affect all of them. For example, an "Arbitrary file reading" vulnerability in the web server allows an attacker to read the DB file and get records from a DB table as well.

How to fix

Update your sofware up to the latest version

Advisory status

16.01.2014 - Vendor gets vulnerability details
14.03.2014 - Vendor releases fixed version and details
27.03.2014 - Public disclosure

Credits

The vulnerability was detected by Alexey Osipov, Alexander Tlyapov, and Valentin Shilnenkov, Positive Research Center (Positive Technologies Company)

References

http://en.securitylab.ru/lab/PT-2014-04

Reports on the vulnerabilities previously discovered by Positive Research:

http://www.ptsecurity.com/research/advisory/
http://en.securitylab.ru/lab/

Threatscape