[ARL02-A01] Vulnerability in Hosting Controller

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 





+/-----------\---------- ALPER Research Labs   --------/---
--------/+
+/------------\---------  Security Advisory    -------/----------
--/+
+/-------------\--------    ID: ARL02-A01      ------/-----------
--/+
+/--------------\------- salper@pcworld.com.tr -----/-------
-------/+


Advisory Information
--------------------
Software Package   : Hosting Controller
Vendor Homepage    : 
http://www.hostingcontroller.com
Vulnerable Versions: 1.4.1 , 1.4.b and probably 
previous versions
Platforms          : Windows based servers
Vulnerability Type : Design Error
Vendor Contacted   : 23/Jan/2002
Prior Problems     : BID: 3808 & BID: 3811
Current Version    : 1.4.1 (vulnerable)


Summary
-------
Hosting Controller is an all in one administrative 
hosting tool for Windows based servers.
It automates all hosting tasks and gives full control of 
each website to the respective owner.
A vulnerability exists in Hosting Controller which could 
enable anyone to confirm the validity 
of usernames and crack the password's of known 
users via brute forcing method.

Details
-------
The site owners' may login to Hosting Controller by 
submitting the login form either found at;
http://www.thesite.com.tr/admin/
http://www.thesite.com.tr/webadmin/
http://www.thesite.com.tr/advwebadmin/
http://www.thesite.com.tr/hostingcontroller/
      ¤ These paths are the most common ones for 
Hosting Controller login page.

If a non-existing username is entered, the form 
returns the message:
"The user name could not be found".
Anyone can try this login process for finding an 
existing user name. When an existing username 
is entered, but the password supplied with it was 
incorrect, the form returns the message:
"The user has entered an invalid password".
So now, the attacker may launch a brute force attack 
on the password entry, for the known username.
I should point out that, generally domain names or 
related variations are used as usernames in 
Hosting Controller. So it is even possible to easily 
predict the username.
Once logged in, the attacker will have total control 
over the web site.

Solution
--------
The vendor replied within 12 hours after the contact, 
stating they would release a patch within 
1-2 weeks which will probably be based on the first of 
the below suggested solutions.
Hosting Controller managers were highly responsive 
to this advisory submission and acknowledged 
the security vulnerability in the Hosting Controller 
programme.
They responded quickly and professionally which is a 
really good action that every vendor should 
take in such occasions.

1. A practical solution might be limiting login tries 
from the same IP, on a time basis.
Eg: 3 wrong password entries from the same IP 
within an hour, may trigger such a protection.

2. The login form might return a message like "Wrong 
username or password", if either of the 
username or the password entry is wrong.

3. Assignment of hardly guessable usernames and 
passwords, and changing of passwords in a period 
of time might also be a quick idea.

4. Also the path to the Hosting Controller might be 
changed to a non-default path or perhaps the 
path might be named with random character 
sequences.

Credits
-------
Discovered on Jan 23, 2002 by Ahmet Sabri ALPER 
<salper@pcworld.com.tr>
Ahmet Sabri ALPER is the System Security Editor of 
PCLIFE Magazine.

References
----------
Product Web Page: http://www.hostingcontroller.com


[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux