This is an S/MIME signed message. ---------z25841_boundary_sign Content-Type: multipart/alternative; boundary="=_alternative 004E3375C125709F_=" This is a multipart message in MIME format. --=_alternative 004E3375C125709F_= Content-Type: text/plain; charset="ISO-8859-1" Content-Transfer-Encoding: quoted-printable Title: Paros proxy 3.2.5 and below blank "sa" database password=20 Summary:=20 Paros is an intercepting HTTP/HTTPS proxy for use in security=20 testing web applications.=20 Paros version 3.2.5 and below may contain a flaw where a remote=20 attacker can connect to a=20 database port opened on the machine running Paros, without=20 supplying any credentials.=20 The problem stems from use of a blank "sa" password on the=20 open-source database ("HSQLDB")=20 which is integrated with Paros.=20 The database server (which is written in Java) contains=20 functionality for executing arbitrary Java=20 statements. This is how HSQLDB provides Stored Procedure=20 functionality.=20 Impact of successful exploitation:=20 The issue may result in disclosure of confidential data, and=20 possible execution of commands on=20 the victim machine.=20 A remote attacker may find credentials for web applications, valid=20 session IDs, and confidential=20 data downloaded from the website being tested with Paros. This=20 information is is present in the=20 database.=20 Additionally, the possibility of executing Java statements on the=20 database server may mean that=20 an attacker can gain access to files or execute command at the OS=20 level (by performing the=20 Java equivalent of a "system()" call). This has not been=20 investigated fully, but appears possible. History:=20 The overall time-to-correction was EXCEEDINGLY fast: October 3rd 2005: Problem discovered / reported=20 October 7th 2005: Issue re-reported via sourceforge, as mail = appeared lost in transit=20 October 7th 2005: Paros developer releases updated version=20 where DB listes on localhost only Countermeasures:=20 Upgrade to version 3.2.6.=20 Firewall the host running Paros.=20 Demonstration:=20 To demonstrate this, first start Paros on the victim host (here,=20 192.168.0.1). On the attacking host, ensure HSQLDB is installed, and add the following=20 lines to the file=20 $HOME/sqltool.rc on the attacking host:=20 # connect to victimhost as sa, victimhost has IP 192.168.0.1=20 urlid victimhost-sa=20 url: jbdc:hsqldb:hsql://192.168.0.1=20 username sa=20 password =20 To connect using the "victimhost-sa" block above run:=20 =20 java -jar $HSQLDB=5FHOME/jsqldb.jar victimhost-sa=20 At this point, it is possible to pull data from the tables in the database = (browsing state, history, credentials).=20 The page at http://hsqldb.org/doc/guide/ch09.html#call-section also states = it is possible to execute Java statements=20 by writing them in the format "java.lang.Math.sqrt"(2.0).=20 Andrew Christensen FortConsult ApS Tranevej 16-18 2400 K=F8benhavn NV tlf. (+45) 7020 7525 www.fortconsult.net=20 FortConsult er som de f=F8rste i Skandinavien blevet certificeret af VISA o= g=20 MasterCard til at udf=F8re sikkerhedsgennemgange af virksomheders kritiske = betalingssystemer. FortConsult is the only Scandinavian firm certified by VISA to perform=20 security audits on critical card-payment systems.=20 --=_alternative 004E3375C125709F_= Content-Type: text/html; charset="ISO-8859-1" Content-Transfer-Encoding: quoted-printable
Title:        Pa= ros proxy 3.2.5 and below blank "sa" database password

Summary:

      Paros is an intercepting HTTP/HTTPS proxy for use in security testing web applications.


      Paros version 3.2.5 and below  may contain a flaw where a remote attacker can connect to a

       database port opened on the machine running Paros, without supplying any credentials= .

      The problem stems from use of a blank "sa" password on the open-source database ("HSQLDB")

      which is integrated with Paros.


      The database server (which is written in Java) contai= ns functionality for executing arbitrary Java

       statement= s. This is how HSQLDB provides Stored Procedure functionality.


Impact of successful exploitation:


      The issue may result in disclosure of confidential data, and possible execution of commands on

      the victim machine.

      A remote attacker may find credentials for web applic= ations, valid session IDs, and confidential
      data downloaded from the website being tested with Paros. This information is is present in the
      database.


      Additionally, the possibility of executing Java state= ments on the database server may mean that

      an attacker can gain access to files or execute comma= nd at the OS level (by performing the
      Java equivalent of a "system()" call).
This has not been investigated fully, but appears possible.


History:

       The overa= ll time-to-correction was EXCEEDINGLY fast:

      October 3rd 2005:        Problem discovered / reported
      October 7th 2005:        Issue re-reported via sourceforge, as mail appeared lost in transit

      October 7th 2005:        Paros developer releases updated version
where DB listes on localhost only


Countermeasures:


      Upgrade to version 3.2.6.
      Firewall the host running Paros.



Demonstration:


To demonstrate this, first start Paros on the victim host (here, 192.168.0.= 1).


On the attacking host, ensure HSQLDB is installed, and add the following lines to the file
$HOME/sqltool.rc on the attacking ho= st:

      # connect to victimhost as sa, victimhost has IP 192.168.0.1
      urlid victimhost-sa
      url: jbdc:hsqldb:hsql://192.168.0.1
      username sa
      password  


To connect using the "victimhost-sa" block above run:


      java -jar $HSQLDB=5FHOME/jsqldb.jar victimhost-sa

At this point, it is possible to pull data from the tables in the database (browsing state, history, credentials).


The page at http://hsqldb.org/doc/guide/ch09.html#call-section also states it is possible to execute Java statements
by writing them in the format "java.lang.Math.sqrt"(2.0).
<= font size=3D3>


Andrew Christensen
FortConsult ApS
Tranevej 16-18
2400 K=F8benhavn NV
tlf. (+45) 7020 7525
www.fortconsult.net


FortConsult er som de f=F8rste i Skandinavien blevet certificeret af VISA og MasterCard til at udf=F8re sikkerhedsgennemgange af virksomheders kritis= ke betalingssystemer.
FortConsult is the only Scandinavian firm certified by VISA to perform security audits on critical card-payment systems.

--=_alternative 004E3375C125709F_=-- ---------z25841_boundary_sign Content-Type: application/x-pkcs7-signature; name="smime.p7s" Content-Transfer-Encoding: base64 Content-Disposition: attachment; filename="smime.p7s" Content-Description: S/MIME Cryptographic Signature MIAGCSqGSIb3DQEHAqCAMIIWSwIBATELMAkGBSsOAwIaBQAwCwYJKoZIhvcNAQcBoIIUojCCBRkw ggQBoAMCAQICBD5IvcQwDQYJKoZIhvcNAQEFBQAwMTELMAkGA1UEBhMCREsxDDAKBgNVBAoTA1RE QzEUMBIGA1UEAxMLVERDIE9DRVMgQ0EwHhcNMDMwMjExMDgzOTMwWhcNMzcwMjExMDkwOTMwWjAx MQswCQYDVQQGEwJESzEMMAoGA1UEChMDVERDMRQwEgYDVQQDEwtUREMgT0NFUyBDQTCCASIwDQYJ KoZIhvcNAQEBBQADggEPADCCAQoCggEBAKxi9mEgss/AxoXX43nmzO3yOZKkly5ko4Rbh5xM/aTz xF8hvVYQ69suYeyTaeOjzL2ZwwX8BrjKNhz+kI5JTMRWmi9WvM97DPFvR6YNQ03i6R05NM2NLNkS mPnj4cFKfIY4xKnEYYjSXq8aJk3V5KAiR4TZZLcZlvzsGeSylyZOSkzLjySLVBgcSGF71Yho2l21 6s0aMMGAg3ZQqk/R1N048O8W9OEMUAa/6vt6SaEoKxz2/BUyo3Rqj6nDYilxMeU7pGAXXnTm2hPt 6R8fG9GyaHPGEDR1RhAQ45AAdkDLi7dDCSH/q06TxljppYLbd8Q6mbFylUkE8Lcr+ntZjt0CAwEA AaOCAjcwggIzMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMIHsBgNVHSAEgeQwgeEw gd4GCCqBUIEpAQEBMIHRMC8GCCsGAQUFBwIBFiNodHRwOi8vd3d3LmNlcnRpZmlrYXQuZGsvcmVw b3NpdG9yeTCBnQYIKwYBBQUHAgIwgZAwChYDVERDMAMCAQEagYFDZXJ0aWZpa2F0ZXIgZnJhIGRl bm5lIENBIHVkc3RlZGVzIHVuZGVyIE9JRCAxLjIuMjA4LjE2OS4xLjEuMS4gQ2VydGlmaWNhdGVz IGZyb20gdGhpcyBDQSBhcmUgaXNzdWVkIHVuZGVyIE9JRCAxLjIuMjA4LjE2OS4xLjEuMS4wEQYJ YIZIAYb4QgEBBAQDAgAHMIGBBgNVHR8EejB4MEigRqBEpEIwQDELMAkGA1UEBhMCREsxDDAKBgNV BAoTA1REQzEUMBIGA1UEAxMLVERDIE9DRVMgQ0ExDTALBgNVBAMTBENSTDEwLKAqoCiGJmh0dHA6 Ly9jcmwub2Nlcy5jZXJ0aWZpa2F0LmRrL29jZXMuY3JsMCsGA1UdEAQkMCKADzIwMDMwMjExMDgz OTMwWoEPMjAzNzAyMTEwOTA5MzBaMB8GA1UdIwQYMBaAFGC1hexWZH4SGSdnHVAVS3OuO/kSMB0G A1UdDgQWBBRgtYXsVmR+EhknZx1QFUtzrjv5EjAdBgkqhkiG9n0HQQAEEDAOGwhWNi4wOjQuMAMC BJAwDQYJKoZIhvcNAQEFBQADggEBAAq6JiZG03OoCfNrCzCZ/YrhV3oR07iU1wkQbqOxOAPRtvJD QSlip3LY+3wF5jFwJ1QYTop8TuXRyox4iM8b05CL5iP4Cw4zQ32c4goZj8kBPnRddMmLHAPlGMgB TD/LlwVdmHGmmG+2fL03f77hkyVtb/AKrRcY4QO8BynIrSbo+GHw/SEJfpqOqWh9SGJyvQDqAZm4 BoJRgU7x9bSRVLkjegCan12N4DxkuRoSkirHgkRyOdziPMbYVfUVTsgFDtvG0GKm7BW0tQKC26yM ooHwm5kx9SAgqIhhCgeflPzQ1xvMLhfzBCd2Z+tUg/2kkH4GPQSjQy3a/Ati6i9fYlMwggUZMIIE AaADAgECAgQ+SL3EMA0GCSqGSIb3DQEBBQUAMDExCzAJBgNVBAYTAkRLMQwwCgYDVQQKEwNUREMx FDASBgNVBAMTC1REQyBPQ0VTIENBMB4XDTAzMDIxMTA4MzkzMFoXDTM3MDIxMTA5MDkzMFowMTEL MAkGA1UEBhMCREsxDDAKBgNVBAoTA1REQzEUMBIGA1UEAxMLVERDIE9DRVMgQ0EwggEiMA0GCSqG SIb3DQEBAQUAA4IBDwAwggEKAoIBAQCsYvZhILLPwMaF1+N55szt8jmSpJcuZKOEW4ecTP2k88Rf Ib1WEOvbLmHsk2njo8y9mcMF/Aa4yjYc/pCOSUzEVpovVrzPewzxb0emDUNN4ukdOTTNjSzZEpj5 4+HBSnyGOMSpxGGI0l6vGiZN1eSgIkeE2WS3GZb87BnkspcmTkpMy48ki1QYHEhhe9WIaNpdterN GjDBgIN2UKpP0dTdOPDvFvThDFAGv+r7ekmhKCsc9vwVMqN0ao+pw2IpcTHlO6RgF1505toT7ekf HxvRsmhzxhA0dUYQEOOQAHZAy4u3Qwkh/6tOk8ZY6aWC23fEOpmxcpVJBPC3K/p7WY7dAgMBAAGj ggI3MIICMzAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjCB7AYDVR0gBIHkMIHhMIHe BggqgVCBKQEBATCB0TAvBggrBgEFBQcCARYjaHR0cDovL3d3dy5jZXJ0aWZpa2F0LmRrL3JlcG9z aXRvcnkwgZ0GCCsGAQUFBwICMIGQMAoWA1REQzADAgEBGoGBQ2VydGlmaWthdGVyIGZyYSBkZW5u ZSBDQSB1ZHN0ZWRlcyB1bmRlciBPSUQgMS4yLjIwOC4xNjkuMS4xLjEuIENlcnRpZmljYXRlcyBm cm9tIHRoaXMgQ0EgYXJlIGlzc3VlZCB1bmRlciBPSUQgMS4yLjIwOC4xNjkuMS4xLjEuMBEGCWCG SAGG+EIBAQQEAwIABzCBgQYDVR0fBHoweDBIoEagRKRCMEAxCzAJBgNVBAYTAkRLMQwwCgYDVQQK EwNUREMxFDASBgNVBAMTC1REQyBPQ0VTIENBMQ0wCwYDVQQDEwRDUkwxMCygKqAohiZodHRwOi8v Y3JsLm9jZXMuY2VydGlmaWthdC5kay9vY2VzLmNybDArBgNVHRAEJDAigA8yMDAzMDIxMTA4Mzkz MFqBDzIwMzcwMjExMDkwOTMwWjAfBgNVHSMEGDAWgBRgtYXsVmR+EhknZx1QFUtzrjv5EjAdBgNV HQ4EFgQUYLWF7FZkfhIZJ2cdUBVLc647+RIwHQYJKoZIhvZ9B0EABBAwDhsIVjYuMDo0LjADAgSQ MA0GCSqGSIb3DQEBBQUAA4IBAQAKuiYmRtNzqAnzawswmf2K4Vd6EdO4lNcJEG6jsTgD0bbyQ0Ep Yqdy2Pt8BeYxcCdUGE6KfE7l0cqMeIjPG9OQi+Yj+AsOM0N9nOIKGY/JAT50XXTJixwD5RjIAUw/ y5cFXZhxpphvtny9N3++4ZMlbW/wCq0XGOEDvAcpyK0m6Phh8P0hCX6ajqlofUhicr0A6gGZuAaC UYFO8fW0kVS5I3oAmp9djeA8ZLkaEpIqx4JEcjnc4jzG2FX1FU7IBQ7bxtBipuwVtLUCgtusjKKB 8JuZMfUgIKiIYQoHn5T80NcbzC4X8wQndmfrVIP9pJB+Bj0Eo0Mt2vwLYuovX2JTMIIFMDCCBBig AwIBAgIEP9JA9zANBgkqhkiG9w0BAQUFADAxMQswCQYDVQQGEwJESzEMMAoGA1UEChMDVERDMRQw EgYDVQQDEwtUREMgT0NFUyBDQTAeFw0wNTEwMDcwNzMyMjhaFw0wNzEwMDcwODAyMjhaMHsxCzAJ BgNVBAYTAkRLMSgwJgYDVQQKEx9GT1JUQ09OU1VMVCBBcFMgLy8gQ1ZSOjI2MzczNTQ5MUIwGQYD VQQDExJBbmRyZXcgQ2hyaXN0ZW5zZW4wJQYDVQQFEx5DVlI6MjYzNzM1NDktUklEOjExMjg0OTk0 OTI2OTkwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAJgniAQNYj+nuTJ6yGpx2gGb5HiFOtZB o0emuB8QdxDGdI3uWvKyRTiczO06VzaodQsMjqQc85qgUfeU2PJ3B2Fh5nWustWyOW/iEUqZMVc4 KWOluEm8vcRGEDCkW2e5ojuX5OmkmAfTAK8edfPcCMP49rFTBTocyt5Kmtrkb0MfAgMBAAGjggKI MIIChDAOBgNVHQ8BAf8EBAMCA/gwKwYDVR0QBCQwIoAPMjAwNTEwMDcwNzMyMjhagQ8yMDA3MTAw NzA4MDIyOFowggE3BgNVHSAEggEuMIIBKjCCASYGCiqBUIEpAQEBAgMwggEWMC8GCCsGAQUFBwIB FiNodHRwOi8vd3d3LmNlcnRpZmlrYXQuZGsvcmVwb3NpdG9yeTCB4gYIKwYBBQUHAgIwgdUwChYD VERDMAMCAQEagcZGb3IgYW52ZW5kZWxzZSBhZiBjZXJ0aWZpa2F0ZXQgZ+ZsZGVyIE9DRVMgdmls a+VyLCBDUFMgb2cgT0NFUyBDUCwgZGVyIGthbiBoZW50ZXMgZnJhIHd3dy5jZXJ0aWZpa2F0LmRr L3JlcG9zaXRvcnkuIEJlbeZyaywgYXQgVERDIGVmdGVyIHZpbGvlcmVuZSBoYXIgZXQgYmVncuZu c2V0IGFuc3ZhciBpZnQuIHByb2Zlc3Npb25lbGxlIHBhcnRlci4wHgYDVR0RBBcwFYETYW5jQGZv cnRjb25zdWx0Lm5ldDCBgwYDVR0fBHwwejBKoEigRqREMEIxCzAJBgNVBAYTAkRLMQwwCgYDVQQK EwNUREMxFDASBgNVBAMTC1REQyBPQ0VTIENBMQ8wDQYDVQQDEwZDUkw4NjIwLKAqoCiGJmh0dHA6 Ly9jcmwub2Nlcy5jZXJ0aWZpa2F0LmRrL29jZXMuY3JsMB8GA1UdIwQYMBaAFGC1hexWZH4SGSdn HVAVS3OuO/kSMB0GA1UdDgQWBBRjdh/xaJnfa5lRyX8b4vSVuJ7YFjAJBgNVHRMEAjAAMBkGCSqG SIb2fQdBAAQMMAobBFY3LjEDAgOoMA0GCSqGSIb3DQEBBQUAA4IBAQAsLvdEtsRAK4NZmo1LjpZk VHQWe0H2XaL+pp9tfdhvgzukvdJsFgEwiXa+tLTuJYIgCQlqsPY4zfosI0pLhggW8fc/7LQM4hVZ W4nU0v9nwZx6wIxw1ASMpZj4wOrq/uAwk9m8dSKPFZxQsNUrkxqYMNDl074uSR6a9k61v0ni6alz 4t+KXAbuwGX5ifMpWQ0NT/tbfhP1Z7q+LasttOaqqKwC2b+0Gkm3b7Po4h/Mo/Dxlv6OS4uBdpZ0 D6y7BViv3E7smCDRmFvONbACKecOO/RoufDFG6s4jdzSw704+3WUh4JZXIqpybzDPETIEtXxi5rr QDjSJsGzPMTis8yfMIIFMDCCBBigAwIBAgIEP9JA9zANBgkqhkiG9w0BAQUFADAxMQswCQYDVQQG EwJESzEMMAoGA1UEChMDVERDMRQwEgYDVQQDEwtUREMgT0NFUyBDQTAeFw0wNTEwMDcwNzMyMjha Fw0wNzEwMDcwODAyMjhaMHsxCzAJBgNVBAYTAkRLMSgwJgYDVQQKEx9GT1JUQ09OU1VMVCBBcFMg Ly8gQ1ZSOjI2MzczNTQ5MUIwGQYDVQQDExJBbmRyZXcgQ2hyaXN0ZW5zZW4wJQYDVQQFEx5DVlI6 MjYzNzM1NDktUklEOjExMjg0OTk0OTI2OTkwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAJgn iAQNYj+nuTJ6yGpx2gGb5HiFOtZBo0emuB8QdxDGdI3uWvKyRTiczO06VzaodQsMjqQc85qgUfeU 2PJ3B2Fh5nWustWyOW/iEUqZMVc4KWOluEm8vcRGEDCkW2e5ojuX5OmkmAfTAK8edfPcCMP49rFT BTocyt5Kmtrkb0MfAgMBAAGjggKIMIIChDAOBgNVHQ8BAf8EBAMCA/gwKwYDVR0QBCQwIoAPMjAw NTEwMDcwNzMyMjhagQ8yMDA3MTAwNzA4MDIyOFowggE3BgNVHSAEggEuMIIBKjCCASYGCiqBUIEp AQEBAgMwggEWMC8GCCsGAQUFBwIBFiNodHRwOi8vd3d3LmNlcnRpZmlrYXQuZGsvcmVwb3NpdG9y eTCB4gYIKwYBBQUHAgIwgdUwChYDVERDMAMCAQEagcZGb3IgYW52ZW5kZWxzZSBhZiBjZXJ0aWZp a2F0ZXQgZ+ZsZGVyIE9DRVMgdmlsa+VyLCBDUFMgb2cgT0NFUyBDUCwgZGVyIGthbiBoZW50ZXMg ZnJhIHd3dy5jZXJ0aWZpa2F0LmRrL3JlcG9zaXRvcnkuIEJlbeZyaywgYXQgVERDIGVmdGVyIHZp bGvlcmVuZSBoYXIgZXQgYmVncuZuc2V0IGFuc3ZhciBpZnQuIHByb2Zlc3Npb25lbGxlIHBhcnRl ci4wHgYDVR0RBBcwFYETYW5jQGZvcnRjb25zdWx0Lm5ldDCBgwYDVR0fBHwwejBKoEigRqREMEIx CzAJBgNVBAYTAkRLMQwwCgYDVQQKEwNUREMxFDASBgNVBAMTC1REQyBPQ0VTIENBMQ8wDQYDVQQD EwZDUkw4NjIwLKAqoCiGJmh0dHA6Ly9jcmwub2Nlcy5jZXJ0aWZpa2F0LmRrL29jZXMuY3JsMB8G A1UdIwQYMBaAFGC1hexWZH4SGSdnHVAVS3OuO/kSMB0GA1UdDgQWBBRjdh/xaJnfa5lRyX8b4vSV uJ7YFjAJBgNVHRMEAjAAMBkGCSqGSIb2fQdBAAQMMAobBFY3LjEDAgOoMA0GCSqGSIb3DQEBBQUA A4IBAQAsLvdEtsRAK4NZmo1LjpZkVHQWe0H2XaL+pp9tfdhvgzukvdJsFgEwiXa+tLTuJYIgCQlq sPY4zfosI0pLhggW8fc/7LQM4hVZW4nU0v9nwZx6wIxw1ASMpZj4wOrq/uAwk9m8dSKPFZxQsNUr kxqYMNDl074uSR6a9k61v0ni6alz4t+KXAbuwGX5ifMpWQ0NT/tbfhP1Z7q+LasttOaqqKwC2b+0 Gkm3b7Po4h/Mo/Dxlv6OS4uBdpZ0D6y7BViv3E7smCDRmFvONbACKecOO/RoufDFG6s4jdzSw704 +3WUh4JZXIqpybzDPETIEtXxi5rrQDjSJsGzPMTis8yfMYIBhDCCAYACAQEwOTAxMQswCQYDVQQG EwJESzEMMAoGA1UEChMDVERDMRQwEgYDVQQDEwtUREMgT0NFUyBDQQIEP9JA9zAJBgUrDgMCGgUA oIGiMBgGCSqGSIb3DQEJAzELBgkqhkiG9w0BBwEwHAYJKoZIhvcNAQkFMQ8XDTA1MTAxOTE0MTQw OVowIwYJKoZIhvcNAQkEMRYEFFseWP0W1qZiuU4yJL2jrM++teULMEMGCSqGSIb3DQEJDzE2MDQw BwYFKw4DAh0wDgYIKoZIhvcNAwICAgCAMAoGCCqGSIb3DQMHMA0GCCqGSIb3DQMCAgEoMA0GCSqG SIb3DQEBAQUABIGAfyfAymIgLdU9B/Q8mAiHCUCBwG/E0nW80acJHySygDiGixeuNTRXjriJldi8 YE5QiJjz/IkxLbQZZ8tqKe4ltcaPJIT1gPdZBWVU1eo7rxxyOpCjv1qQT6GK6qrk1DoD9Mq8vhEX lIZs1nhc2bdAMqQ11vjdeWXeTmz0F9JkvkEAAAAA ---------z25841_boundary_sign--