AOH :: HP Unsorted O :: B06-5357.HTM

Oneorzero helpdesk



Advisory for Oneorzero helpdesk
Advisory for Oneorzero helpdesk



Permanant Link : http://www.whitedust.net/speaks/3043/ 

------------------------------------------------------------
	    - Advisory for OneOrZero Helpdesk -
------------------------------------------------------------
 - OneOrZero Helpdesk -

AFFECTED PRODUCTS
================OneOrZero Helpdesk v1.6.0 - v1.6.4


OVERVIEW
=======>From the website: "The OneOrZero Open Source Task Management and Help Desk
System is a powerful task management and help desk application,
based to 'get the job done'."
http://www.oneorzero.com/ 

An insecure password reset allows external knowledge of what the
password is set to.



DETAILS
======1. Information Disclosure

The forgot password function will reset the password after a security question
is answered.  However, the admin user has this password left blank by default
and is often left that way after the program is installed.  By
attempting to reset
the admin password and leaving the answer blank one can force a reset of the
password.  However, since the password reset function sets the password based
only on the username and the time on the server, the password that it is set
to can be determine easily. Once the time of a server is discovered determining
what the password is set to becomes trivial.


POC
==
1.
------

The password is generated with the following code:
$password = time().$_POST[username];

Quite often web servers will return the date on the servers for when
the request is
processed.  For example "Date: Thu, 12 Oct 2006 01:11:21 GMT"

The following command on a linux will return the unix time for the
system for when
the request was processed.

bash$ date --date="Thu, 12 Oct 2006 01:11:21 GMT" "+%s"
1160615001

Which allows us to deduce the return password of 1160615001admin

SOLUTION:
========vendor contact:
Info@oneorzero.com Sept. 28 Vendor notification. 
halla@oneorzero.com Sept. 29 Vendor reply 

halla@oneorzero.com Oct. 10 oneorzero v1.6.5.4 released to address this issue. 



Credits
======This vulnerability was discovered and researched by
Michael Klingler
whitehatguru at gmail.com
SecurityMetrics, Inc.

The entire AOH site is optimized to look best in Firefox® 3 on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2014 AOH
We do not send spam. If you have received spam bearing an artofhacking.com email address, please forward it with full headers to abuse@artofhacking.com.