PT-2014-04: Single Sign-On Vulnerability in Nixu Namesurfer
Vulnerable software
Nixu Namesurfer
Version: 7.2.2 and earlier
Link:
http://www.nixusoftware.com/our_products_ipam.html
Severity level
Severity level: High
Impact: Unauthorized Access
Access Vector: Remote
CVSS v2:
Base Score: 9.0
Vector: (AV:N/AC:L/Au:S/C:C/I:C/A:C)
CVE: not assigned
Software description
Nixu Namesurfer implements a unified system for manageming DNS servers via web interface.
Vulnerability description
The specialists of the Positive Research center have detected a Single Sign-On vulnerability in Nixu Namesurfer.
All services used by the Nixu Namesurfer software (PostgreSQL, Apache) use the same user account to operate. Therefore, a weakness in one of the services will affect all of them. For example, an "Arbitrary file reading" vulnerability in the web server allows an attacker to read the DB file and get records from a DB table as well.
How to fix
Update your sofware up to the latest version
Advisory status
16.01.2014 - Vendor gets vulnerability details
14.03.2014 - Vendor releases fixed version and details
27.03.2014 - Public disclosure
Credits
The vulnerability was detected by Alexey Osipov, Alexander Tlyapov, and Valentin Shilnenkov, Positive Research Center (Positive Technologies Company)
References
http://en.securitylab.ru/lab/PT-2014-04
Reports on the vulnerabilities previously discovered by Positive Research:
http://www.ptsecurity.com/research/advisory/
http://en.securitylab.ru/lab/