<<< Date Index >>>     <<< Thread Index >>>

CA UniCenter Management Portal Username Enumeration Vulnerability




CA UniCenter Management Portal Username Enumeration Vulnerability

Package:                CA UniCenter Management Portal
Vendor Web Site:        http://www.ca.com
Versions:               UniCenter Management Portal 2.0 and 3.1
Platform:               Windows
Local:                  No
Remote:                 Yes
Fix Available:          Yes
Advisory Author:        Thomas Adams (tgadams@xxxxxxxxxxxxx)


Background:
>From www.ca.com: "Unicenter Management Portal provides intuitive access to 
>enterprise management information,offering a personalized web interface for 
>various Unicenter management solutions. Security and administrative control 
>are provided through pre-defined workplaces. Filtered event notifications can 
>be customized to suit individual roles and responsibilities, for personalized 
>views tailored to your users' unique needs."
The portal provides a forgot password link, that does not give a proper 
response for an invalid user. Using a script, an attacker can quickly find 
users that have access to the web interface using the technique below. This 
will help facilitate brute force attacks 
against the server.



Exploit:
Connect to the management portal(default 8080). Choose the 'Forgot your 
Password?' option. Enter a username, such as test. If the test account does not 
exists, the following will be displayed: "User not found: test" A legit account 
will produce a "Password has been sent" or "Email address not Found" message. 



Vendor Response:
CAs recommendation was to disable the 'Forgot Password' feature. To isable this 
option in the Portal, add the following line to the 
[PORTAL_INSTALL]\properties\local.properties file.
 
show.passwords.in.api=false
 
You will need to restart the portal after manually editing the file.