MAUI Inventory: Vulnerability Discovery and CNE Development SEPTEMBER 01, 2009 2
Total Page:16
File Type:pdf, Size:1020Kb
MAUI Inventory: Vulnerability Discovery and CNE Development SEPTEMBER 01, 2009 2 TABLE OF CONTENTS Executive Summary………………………………………………………. 3 About MAUI…………………………………………………………………. 4 About CORSICA……………………………………………………………. 5 MAUI Inventory.……………………………………………………………. 6 PROPRIETARY AND CONFIDENTIAL 3 Executive Summary This document provides information on the MAUI and CORSICA products and the vulnerability discovery and exploit development produced from these offerings. In addition, the current MAUI inventory is described at a high level on each capability. Product demonstrations are available upon request. Endgame Systems leverages its world-class capabilities in the fields of computer vulnerability research and global network awareness to enhance the overall Network Warfare capability of United States intelligence and military organizations. PROPRIETARY AND CONFIDENTIAL 4 About MAUI Maui is a program that produces software deliverables for high-value, reliable and non- public (zero-day) NetA and CNE software packages. These deliverables provide access vectors via software vulnerabilities in Web applications, client-side applications, server-side applications, and embedded systems. The Endgame Systems’ Vulnerability Development Lifecycle (VDL) drives the process used for discovery of software vulnerabilities leading to robust CNE capabilities. The VDL provides a framework for processing discovered vulnerabilities through to completed products. The stages of the VDL are as follows: STAGE 0 POTENTIAL: TARGET APPLICATION CRASHING RELIABLY STAGE1 PROBABLE: RELIABLE MEMORY CORRUPTION STAGE 2 CONFIRMED: RELIABLE CODE EXECUTION STAGE 3 STABLE: RELIABLE EXPLOITATION STAGE 4 ROBUST: 100% RELIABLE ON ALL SUPPORTED PLATFORMS PROPRIETARY AND CONFIDENTIAL 5 About CORSICA Corsica is an active reconnaissance project enabling the discovery and identification of vulnerable web applications and web enabled devices in use on the Internet. A web application may be defined as a computer software application written in a browser- supported language (such as HTML, Javascript, Java, etc…) that is access on a web server and rendered executable by the web browser. Web applications are typically softer targets from a vulnerability research and discovery perspective than the underlying web server (Apache, IIS, etc.) and are a pragmatic way of gaining access via exploitation than targeting the underlying web server software itself. One of the focuses of MAUI has been web applications based on the discovery of indigenous web applications via Corsica. The web applications identified by Corsica are applied in two ways: • Seeding MAUI vulnerability discovery and analysis into indigenous web applications deployed around the world as well as those products that have high levels of deployment based on Corsica web crawls. • Correlated against publicly disclosed vulnerabilities The resulting Corsica deliverables are a data feed of intelligence gleaned from correlating known and unknown vulnerabilities to fingerprinted web applications currently in use around the world. Discovery Management Framework Crawl Data Seeding Crawling Collecon Web Port Central Storage Web Spidering Scanning for Analysis SSL Cerficate Signature BaseD Link Analysis ExaminaGon Analysis Passive DNS Correlaon PROPRIETARY AND CONFIDENTIAL 6 MAUI Inventory Current as of September 01, 2009 Application Type Current Inventory Count Client Side Applications 07 Embedded Systems (Not all proDucts displayed) 04* Webmail / Mail Servers (Web Applications) 06 Social Networking / Online Blogs anD Forums (Web Applications) 12 Content Management Systems (CMS) (Web Applications) 20 AdDitional Web Applications 05 TOTAL Count 54 Client Side Applications Application Product VDL Stage Description Type Conficker Worm Malware 3 - Stable The Conficker/Downadup worm rapidly spread to millions of systems throughout 2009 and continues to spread. The malware left behind (Variants A/B) is vulnerable to a stack based buffer overflow. http://www.microsoft.com/security/worms/conficker. aspx Internet Web 3 - Stable Internet Explorer is the world's most popular web Explorer Browser browser with nearly 70% global market share. It is an integral part of the Windows Operating System shipping as the default browser. It contains a vulnerability that is exploitable on the Stack or the Heap allowing for reliable exploitation. http://www.microsoft.com/windows/internet- explorer/default.aspx Mozilla Firefox Web 4 - Robust RUBICON is an Endgame Systems developed browser (RUBICON Browser exploitation technique that allows for Internet Technique) Explorer MSIE vulnerabilities to be exploitable via Mozilla Firefox on WinDows based systems. http://www.mozilla.com/firefox Maxthon Web 3 - Stable Maxthon is a China-baseD, closeD source freeware Browser Browser alternative browser to Internet Explorer that runs on Microsoft Windows. It is popular in China boasting approximately 30% of the browser market share in China. It is vulnerable to a stack based buffer overflow allowing reliable exploitation. http://www.maxthon.com/ Adobe Reader 8 PDF Reader 1 - Probable Early stage potential memory corruption http://www.adobe.com/ Adobe Reader 9 PDF Reader 1 - Probable Early stage potential memory corruption PROPRIETARY AND CONFIDENTIAL 7 http://www.adobe.com/ Adobe Reader / PDF Reader 3 - Stable ADobe ReaDer anD Acrobat Pro 7, 8, anD 9 are Pro 7, 8, 9 vulnerable to a heap overflow that exists in a default component that cannot be disabled through any normal means. It can be exploited in a very targeted way ranging from Windows XP to Windows 7. The shell code currently handles restoration of the heap post exploitation. http://www.adobe.com/ Embedded Systems (Not all products displayed) Application Product VDL Stage Description Type Huawei Router 2 - Huawei Quidway routers are produced by Huawei Quidway ConfirmeD Technologies Co. Ltd. which is the largest supplier of network and telecommunications equipment in China. These routers are vulnerable to a heap based buffer overflow allowing for a reliable denial of service (DoS) and potential remote code execution. http://www.huawei.com Webmail / Mail Servers (Web Applications) Application Product Type VDL Stage Description NJStar Communicator Multilingual 2 - ConfirmeD NJStar Communicator contains a stack Viewer, EDitor, based buffer overflow allowing for remote includes SMTP compromise. Server http://www.njstar.com Winmail Server Enterprise Mail 4 - Robust Winmail Server is an enterprise class mail Server server used extensively in China. It offers the flexiblity of webmail access anD boasts of robust features and extensive security measures. It is vulnerable to an unsafe variable evaluation via the webmail interface that allows for reliable exploitation requiring no authentication. http://www.magicwinmail.net SocketMail Webmail 3 - Stable SocketMail is vulnerable to a SQL Injection Application issue that allows arbitrary database access resulting in complete access to all email in the database. http://www.socketmail.com PROPRIETARY AND CONFIDENTIAL 8 OpenWebmail Webmail 3 - Stable OpenWebmail contains a number of Application vulnerabilities that used together allow access to authenticated user's email account. The primary attack vector is via static cross-site scripting embedded in the body of an email. http://openwebmail.org/ BlueMamba Webmail 3 - Stable BlueMamba is a webmail application and Application is vulnerable to a local file inclusion vulnerability that allows for remote exploitation. http://www.ohloh.net/p/bluemamba iGENUS Webmail 3 - Stable iGENUS is a webmail systems that is Application vulnerable to SQL Injection leading to database arbitrary and file system access. http://www.igenus.org/en/index.html Social Networking / Online Blogs and Forums (Web Applications) Application Product Type VDL Stage Description Serendipity Extensible Web Blog 4 - Robust Serendipity is a web blog product that is vulnerable to a design flaw that allows for reliable exploitation. http://www.s9y.org FlatPress Extensible Web Blog 3 - Stable FlatPress is a web blog system that is vulnerable to a file inclusion vulnerability that allows for access to server resources or allow for arbitrary PHP code execution. http://www.flatpress.org/home LoudBlog Extensible Web Blog 3 - Stable LoudBlog is vulnerable to a design error allowing for authentication bypass. http://www.loudblog.com WordPress Extensible Web Blog 3 - Stable WordPress is a web blog system that is vulnerable to SQL Injection on systems with multi-byte character sets. Due to the nature of WordPress the execution of arbitrary PHP code is possible. http://wordpress.org IPBoard Extensible Web Forum 4 - Robust IPBoard is a web forum proDuct that is vulnerable to input filtering issues that may allow for the remote execution of arbitrary PHP code. http://www.invisionpower.com PROPRIETARY AND CONFIDENTIAL 9 MolyX Extensible Web Forum 3 - Stable MolyX is an indigenous Chinese web forum proDuct that is vulnerable to SQL Injection allowing arbitrary database access. http://www.molyx.com PHPizabi Social Networking 4 - Robust PHPizabi is a Social Networking Platform Platform that is vulnerable to a high risk SQL Injection issue that allows for arbitrary PHP coDe execution. Open source Social Network platforms are popular in regions of the world where the primary western Social Network sites are blocked. http://www.phpizabi.com Pligg Social Networking 3 - Stable Pligg is vulnerable to SQL Injection that Platform may be escalated into PHP code execution. http://www.pligg.com