Entrust Bulletin E01-005: GetAccess Access Service vulnerability

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Entrust Security Bulletin E01-005
=================================

Entrust GetAccess(tm) Access Service Vulnerability


SUMMARY:
========

A vulnerability has been identified in Entrust GetAccess that could allow
unauthorized retrieval of files on certain GetAccess web servers. Entrust
recommends installation of the patch described below, which addresses this
vulnerability.

Impact of vulnerability: 

This vulnerability could potentially result in the unauthorized retrieval of
some files hosted on impacted web servers. Servers running the GetAccess
Access Service are impacted; others running GetAccess runtimes and other
services are not. Typical customer deployments store sensitive content on
GetAccess runtime servers, therefore reducing the impact of this
vulnerability. 

Solution:

Entrust has a made a patch available on the GetAccess support extranet at
the location listed below. A workaround also exists, described below.

Affected Configurations:

- Versions: Entrust GetAccess, all versions
- Platforms: All
- Services: Entrust GetAccess Access Service


TECHNICAL DETAILS:
==================

GetAccess provides a localization mechanism that allows its HTML pages (used
for logout sequences, error messages, timeout messages, and the like) to be
localized using different language-specific templates.  This mechanism takes
in as an argument a query string name-value pair of the format
"LOCALE=XX_XX", where XX_XX corresponds to the name of the sub-directory
within the GetAccess directory structure that contains the appropriate HTML
templates.  GetAccess uses this information to build the directory path and
select the appropriate files.

The vulnerability arises if a user manually substitutes an arbitrary
directory path for the XX_XX value.  The localization mechanism is
vulnerable in the following GetAccess Access Service capabilities:

- The process which drives localized user help during login (if the user 
  clicks the "Help" link on a login screen)
- The process which drives the "About" screen that drives GetAccess 
  version information.

All other GetAccess processes that support the localization mechanism do not
contain this vulnerability.


MITIGATING FACTORS:
===================

- The only files that are potentially exposed are the ones that the web 
  server has permission to access.
- This vulnerability is limited to file retrieval only.  It is not 
  possible to exploit this vulnerability to upload files/data or to execute 
  arbitrary code on the web server.
- Only files on the Access Service machine(s) are potentially at risk of 
  exposure.  The most common deployment architecture segregates the Access 
  Service from web servers hosting any sensitive application data.


PATCH AVAILABILITY:
===================

A patch is available now on the GetAccess support extranet at the following
address: 
https://login.encommerce.com/private/docs/techSupport/Patches-BugFix


WORK-AROUNDS:
=============

If the patch above is applied, the following work-arounds are not required.

- The following files can be removed from GetAccess Access Service hosts, 
  eliminating the vulnerability. Note that the patch above corrects the 
  vulnerability in these scripts and eliminates the need to delete the 
  scripts.
     
     helpwin.gas.bat: this script is referenced by the "Help" link on 
     GetAccess login screens. These links could be replaced with 
     alternative HTML help pages not driven by the GetAccess help script.

     AboutBox.gas.bat: This script drives the "About" box that displays 
     GetAccess version information. 

- As part of normal security policy, customers should not store sensitive 
  data on GetAccess Access Service hosts.  Web servers hosting such data 
  should be secured using the GetAccess Runtime, which is not affected 
  by this vulnerability.  Almost all Entrust GetAccess customers choose 
  to deploy in this sort of configuration even in the absence of this 
  vulnerability.

- If the Access Service component is co-located on a web server hosting 
  sensitive files, the Access Service can be segregated to a dedicated 
  server in order to minimize the potential exposure.  

- File permissions should be set such that all files not explicitly needed 
  by the web server are inaccessible to the user account under which the web

  server runs (in keeping with industry best practice).

- Impacted Components: Only GetAccess servers running the Access Service 
  component are affected.   Web servers hosting secure content protected 
  by the GetAccess Runtime are not affected.


SUPPORT:
========

Entrust customer support, including after hours service is available by
phone as follows:

North America:  1-877-754-7878
Elsewhere: +1-613-270-3700


ACKNOWLEDGMENT:
=============== 

Entrust acknowledges the assistance of Rudi Carell, who worked with us to
eliminate this vulnerability.


Copyright (c) 2001 Entrust Inc.


security@entrust.com




[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux