Re: ADV: Re: [arslist] Results of a application pen-test - need to close holes

2012-10-12 Thread Dan Miller
Hi there

something weird is going on with this list, as there were more replies 
yesterday before the system went a bit weird last night..

The last post was about getting together at WWRUG12  for a get together to chat 
about exposing SRM to the public internet...  I remember as someone offered to 
buy the first round  :-)

my colleague and I will be arriving tomorrow for Fairmont, and staying for the 
week for the conference...  if we were to try and get everyone who cares about 
such a thing together, how would one go about that?  this is our first ever 
WWRUG, so we are more likely to be the 2 people in the corner hiding and hoping 
someone talks to us  :-)

cheers
dan

___
UNSUBSCRIBE or access ARSlist Archives at www.arslist.org
attend wwrug12 www.wwrug12.com ARSList: Where the Answers Are


Re: ADV: Re: [arslist] Results of a application pen-test - need to close holes

2012-10-12 Thread Longwing, LJ CTR MDA/IC
Dan,
I'll be a first year this year too.  Look me up and we can chat.doubt I'll 
be able to add much to the SRM to the public discussion, but according to my 
wife, I know how to talk non-stop...so lack of conversation isn't likely to be 
an issue :)

-Original Message-
From: Action Request System discussion list(ARSList) 
[mailto:arslist@ARSLIST.ORG] On Behalf Of Dan Miller
Sent: Friday, October 12, 2012 2:05 AM
To: arslist@ARSLIST.ORG
Subject: Re: ADV: Re: [arslist] Results of a application pen-test - need to 
close holes

Hi there

something weird is going on with this list, as there were more replies 
yesterday before the system went a bit weird last night..

The last post was about getting together at WWRUG12  for a get together to chat 
about exposing SRM to the public internet...  I remember as someone offered to 
buy the first round  :-)

my colleague and I will be arriving tomorrow for Fairmont, and staying for the 
week for the conference...  if we were to try and get everyone who cares about 
such a thing together, how would one go about that?  this is our first ever 
WWRUG, so we are more likely to be the 2 people in the corner hiding and hoping 
someone talks to us  :-)

cheers
dan

___
UNSUBSCRIBE or access ARSlist Archives at www.arslist.org attend wwrug12 
www.wwrug12.com ARSList: Where the Answers Are

___
UNSUBSCRIBE or access ARSlist Archives at www.arslist.org
attend wwrug12 www.wwrug12.com ARSList: Where the Answers Are


Re: Results of a application pen-test - need to close holes

2012-10-08 Thread Dan Miller
Hi John

For the session timeout, i found the setting under web, in user preferences.  
looks like some people had no timeout setting at all, some had 5 hours.  I have 
logged an internal RFC to globally reset everyone’s to one hour, and also to 
set mid-tier webserver timeout to the same to cover all bases.

For the concurrent users, i confirmed that as long as the user does not have a 
fixed-license, + admin role, then they can not log in concurrently from 
multiple machines, so that one is closed.

As for the auto-complete one, the specific comments from the pen-tester was as 
follows.  he was not actually scanning cookies by the looks of it, more viewing 
the screen in front of him.  he provided a screen show showing the web-browser 
offering the last 3 usernames used on that browser.  it should be possible to 
stop browsers remembering a field value,. like online baking sites where no 
matter what the browser is set to, you can nOT remember the last value of the 
field from the last visit:

Web applications allows user to store the password in the browser (remember 
password
function). If auto complete feature is ON and an attacker gains access to the 
browser cache,
can easily obtain the password in clear text and list down the complete user 
id’s present on
particular application.

cheers
dan

___
UNSUBSCRIBE or access ARSlist Archives at www.arslist.org
attend wwrug12 www.wwrug12.com ARSList: Where the Answers Are


Results of a application pen-test - need to close holes

2012-10-08 Thread John Baker
Dan

The Java servlet apidocs does allow a max inactive value to be set on a
session so I guess that's how it's being done, but the preference is an
interesting design choice. 

The form auto-complete functionality is easy to achieve:
http://stackoverflow.com/questions/2530/how-do-you-disable-browser-autocomplete-on-web-form-field-input-tag


John

___
UNSUBSCRIBE or access ARSlist Archives at www.arslist.org
attend wwrug12 www.wwrug12.com ARSList: Where the Answers Are


Re: Results of a application pen-test - need to close holes

2012-10-08 Thread Dan Miller
hi John

so if i open up login.jsp on each of my mid-tiers, and i modiofy the code on 
lines 4 and 8, to include autocomplete=off you think i will get what i 
need?  i am not a coder, so the fact this is JSP, does that matter?


1   td class=login nowrap=nowrap width=20 nbsp;/td
2   td class=login nowrap=nowrap id=LoginLabel-id
3   blabel 
for=username-id%=MessageTranslation.getLocalizedText(locale,User 
Name)%/label/b
4   input name=%=Params.USERNAME% 
maxlength=%=Params.USERNAME_LENGTH% id=username-id 
value=%=com.remedy.arsys.share.HTMLWriter.escape(name)% class=loginfield 
size=30 type=text
5   td class=login nowrap=nowrap width=20nbsp;/td
6   td class=login id=PasswordLabel-id nowrap=nowrap
7   label 
for=pwd-id%=MessageTranslation.getLocalizedText(locale,Password)%/label
8   input name=%=Params.PASSWORD% 
maxlength=%=Params.PASSWORD_LENGTH% id=pwd-id class=loginfield 
size=30 type=password
9   td class=Login nowrap=nowrap width=20nbsp;/td
10  td class=Login name=auth_label nowrap=nowrap
11  label 
for=auth-id%=MessageTranslation.getLocalizedText(locale,Authentication)%/label
12  tdinput type=text NAME=%=Params.AUTHENTICATION_STRING% 
id=auth-id maxlength=%=Params.AUTHENTICATION_STRING_LENGTH% 
class=loginfield size=30/td
13  td class=Login nowrap=nowrap width=20nbsp;/td
14  td class=loginfield nowrap=nowrapnbsp;/td
15  input type=button name=login 
value=%=MessageTranslation.getLocalizedText(locale, Log In)% 
onClick=doLogin();!--;--nbsp;
16  input type=button name=clear 
value=%=MessageTranslation.getLocalizedText(locale, Clear)% 
onClick=clearLogin();!--;--
17  td class=Login nowrap=nowrapnbsp;/td
18  td class=Login nowrap=nowrapnbsp;/td
19  input type=hidden name=%=Params.TIMEZONE% value=
20  input type=hidden name=%=Params.PASSWORD_ENCRYPTED% value=1
21  input type=hidden name=%=Params.GOTO_URL% 
value=%=com.remedy.arsys.share.HTMLWriter.escape(nextPage)% 
22  input type=hidden name=%=Params.SERVER% 
value=%=com.remedy.arsys.share.HTMLWriter.escape(server)% 
23  input type=hidden name=%=Params.IP_OVERRIDE% value=0
24  input type=hidden name=initialState value=-1
25  input type=hidden name=%=HttpSessionKeys.TARGET_URL% value=

___
UNSUBSCRIBE or access ARSlist Archives at www.arslist.org
attend wwrug12 www.wwrug12.com ARSList: Where the Answers Are


Results of a application pen-test - need to close holes

2012-10-08 Thread John Baker
Hello

Yes, you can add autocomplete=off to input elements, ie:

input name=%=Params.USERNAME%
maxlength=%=Params.USERNAME_LENGTH% id=username-id
value=%=com.remedy.arsys.share.HTMLWriter.escape(name)%
class=loginfield size=30 type=text
autocomplete=off


John

___
UNSUBSCRIBE or access ARSlist Archives at www.arslist.org
attend wwrug12 www.wwrug12.com ARSList: Where the Answers Are


Re: Results of a application pen-test - need to close holes

2012-10-08 Thread Longwing, LJ CTR MDA/IC
Dan,
1 - Privilege Escalation - I can't speak to the service catalog (I think that's 
by design)...but if you need the preference record to be only viewable by 
themselves, you could change the permission on field 1 to only allow the 
'Submitter' group access.  This isn't a case of privilege escalation, simply a 
case of being able to do something the evaluator felt they shouldn't be able to 
do

2 - Improper Error Handling - Yes and No...I vaguely understand the concern, 
but I'm not entirely seeing the 'attack vector' based on the content of the 
messages

3 - No Session Timeout - Already addressed

4 - Concurrent User Sessions - Already addressed

5 - Forced Browsing - I'm not familiar with the ability to get into forms 
without authentication, but you could look into applying a 'filter' to your 
tomcat 'arsys' context, thus enabling forced authentication at the web 
serverideally you would want this authentication to be automatic (SSO) so 
that you don't first need to authenticate to the context, then ALSO need to log 
onto the remedy app...that would simply be annoying to the users

6 - Autocomplete - Already addressed

7 - Banner Grabbing - I have no information about this one...sorry, hopefully 
someone else can assist.

-Original Message-
From: Action Request System discussion list(ARSList) 
[mailto:arslist@ARSLIST.ORG] On Behalf Of Dan Miller
Sent: Sunday, October 07, 2012 4:15 AM
To: arslist@ARSLIST.ORG
Subject: Results of a application pen-test - need to close holes

Hi forum,

I hope you can help, and I am sorry in advance for the long post, but I am 
trying to get all this into one post, hoping that someone has gone through this 
exercise before.  So basically, we had an application pen-test before releasing 
our remedy platform to the public internet.  We got 7 things that we need to 
fix, some of them before we can go live, others that can wait a while.

Summary:

1.  Privilege Escalation
2.  Improper Error Handling
3.  No session time out
4.  Concurrent User Sessions
5.  Forced Browsing
6.  Autocomplete feature
7.  Banner Grabbing

Below I have described them a little more with description, recommendation, but 
also the problem I have in getting them implemented.  We are 18 months into our 
first ever Remedy journey, so security is something we have not really 
considered.

Can you please help?


1. Privilege Escalation
--

Description:
-
Privilege escalation in Remedy application allows a user to gain elevated 
access to resources that are meant a privileged user.  It was observed that in 
Remedy a user can view / read other user’s Service catalogue and preference 
details.  The privilege values should be checked from the database and not be 
stored in a client side cookie.
Vulnerable Urls:
 
https://hostname/arsys/forms/server-mame/SRS%3ACFGApplicationPreferences/Dialog+Console/?cacheid=aeabdc61format=html
 https:// 
hostname/arsys/forms/server-mame/SRS%3AServiceRequestConsole/enduser/?cacheid=1bc6c61format=html
 https:// hostname /arsys/atrium/ServiceCatalog.swf 

this means the user can get more rights than they are entitled too. In this 
case a test user was able to see other users preferences, this may need to go 
back to BMC if TT are unable to resolve as it may be an application fault. 
Recommended fix is to enable server side authentication and not client side 
which is currently in place.

Recommendation:
-
It is strongly recommended to check the privilege values from the database 
before granting access to secured recourses applications.

Problem:

How do I even start with this one….  Is there something I am not doing in terms 
of application lock down?  Is it something to do with object-list within 
mid-tier so URLs can be directly browsed to?


2. Improper Error Handling
---
Description
---
If a web application encounters an error condition it may need to display an 
appropriate error message. Sometimes these messages can be detailed enough to 
give away crucial information about the application. This information may 
include database schema/table names, user names, platform specific information 
etc. Applications giving out detailed error messages run the risk of  exposing 
crucial information which can be used later to launch further attacks.

Our Remedy installation seems to have been configured in an insecure way. 
Whenever the application encounters any kind of error condition (such as failed 
execution of an SQL query), an error message of failure SQL operation is sent 
back to the user’s browser.

Example typical error: 
   “The SQL database operation failed. : The data types text and varchar are 
incompatible in the equal to operator. (SQL Server 402) (ARERR 552)”

Recommendation:

In a live environment, application error messages should be kept as short

Re: Results of a application pen-test - need to close holes

2012-10-08 Thread Timothy Powell
Dan,

For the session timeout, i found the setting under web, in user preferences:

As Mr. Baker pointed out, there is also a global timeout setting in the 
Mid-Tier Configuration that's not changeable by the end user.

Tim
-Original Message-
From: Action Request System discussion list(ARSList) 
[mailto:arslist@ARSLIST.ORG] On Behalf Of Dan Miller
Sent: Monday, October 08, 2012 6:21 AM
To: arslist@ARSLIST.ORG
Subject: Re: Results of a application pen-test - need to close holes

Hi John

For the session timeout, i found the setting under web, in user preferences.  
looks like some people had no timeout setting at all, some had 5 hours.  I have 
logged an internal RFC to globally reset everyone’s to one hour, and also to 
set mid-tier webserver timeout to the same to cover all bases.

For the concurrent users, i confirmed that as long as the user does not have a 
fixed-license, + admin role, then they can not log in concurrently from 
multiple machines, so that one is closed.

As for the auto-complete one, the specific comments from the pen-tester was as 
follows.  he was not actually scanning cookies by the looks of it, more viewing 
the screen in front of him.  he provided a screen show showing the web-browser 
offering the last 3 usernames used on that browser.  it should be possible to 
stop browsers remembering a field value,. like online baking sites where no 
matter what the browser is set to, you can nOT remember the last value of the 
field from the last visit:

Web applications allows user to store the password in the browser (remember 
password
function). If auto complete feature is ON and an attacker gains access to the 
browser cache, can easily obtain the password in clear text and list down the 
complete user id’s present on particular application.

cheers
dan

___
UNSUBSCRIBE or access ARSlist Archives at www.arslist.org attend wwrug12 
www.wwrug12.com ARSList: Where the Answers Are

___
UNSUBSCRIBE or access ARSlist Archives at www.arslist.org
attend wwrug12 www.wwrug12.com ARSList: Where the Answers Are


Results of a application pen-test - need to close holes

2012-10-08 Thread John Baker
LJ,

2. Improper error handling

The concern would be that the SQL message may reveal information that
allows a third party to establish the type of database, IP address, etc.
They would then be in a position to mount an attack with information
known about that database, ie current security concerns etc.

5. Forced browsing

You correctly identify a good SSO deployment (ie the JSS SSO Plugin :-)
as a solution to forced browsing, ie ensuring the user has authenticated
before being able to access a resource.




John

___
UNSUBSCRIBE or access ARSlist Archives at www.arslist.org
attend wwrug12 www.wwrug12.com ARSList: Where the Answers Are


Re: Results of a application pen-test - need to close holes

2012-10-08 Thread Longwing, LJ CTR MDA/IC
John,
I would personally be more concerned about someone having a 'clone' of my 
system and gaining more information than them being able to glean much from 
error messages.  Yes, I understand that an error message from the underlying 
vendor db (SQL Server) for example tells them what DB you are running onbut 
I've never been exceedingly concerned about that...I guess I've never been in a 
position where the system I support is so critical that someone is going to 
attack it and any little piece of information provides another nugget of 
capability to exploit.

Being in DOD contracting I understand the concerns for security and such, I'm 
just not sure what they would be do with something like the error they 
described.

-Original Message-
From: Action Request System discussion list(ARSList) 
[mailto:arslist@ARSLIST.ORG] On Behalf Of John Baker
Sent: Monday, October 08, 2012 7:36 AM
To: arslist@ARSLIST.ORG
Subject: Results of a application pen-test - need to close holes

LJ,

2. Improper error handling

The concern would be that the SQL message may reveal information that allows a 
third party to establish the type of database, IP address, etc.
They would then be in a position to mount an attack with information known 
about that database, ie current security concerns etc.

5. Forced browsing

You correctly identify a good SSO deployment (ie the JSS SSO Plugin :-) as a 
solution to forced browsing, ie ensuring the user has authenticated before 
being able to access a resource.




John

___
UNSUBSCRIBE or access ARSlist Archives at www.arslist.org attend wwrug12 
www.wwrug12.com ARSList: Where the Answers Are

___
UNSUBSCRIBE or access ARSlist Archives at www.arslist.org
attend wwrug12 www.wwrug12.com ARSList: Where the Answers Are


Results of a application pen-test - need to close holes

2012-10-08 Thread John Baker
LJ

Yes, the SQL error documented contains little value, but other messages
could contain value. However, this all has to be balanced with, as you
suggest, the type of data held in AR System. Service desk information is
probably less sensitive than HR data, although infrastructure-related
tickets may be of interest to a third party.


John

___
UNSUBSCRIBE or access ARSlist Archives at www.arslist.org
attend wwrug12 www.wwrug12.com ARSList: Where the Answers Are


Re: Results of a application pen-test - need to close holes

2012-10-08 Thread Grooms, Frederick W
Could the FORCED BROWSING be a case of the tester having an open browser on a 
form and then opening another browser?  Because they are logged in under one 
browser session a second will see the login and not ask for credentials.

Fred

-Original Message-
From: Action Request System discussion list(ARSList) 
[mailto:arslist@ARSLIST.ORG] On Behalf Of Longwing, LJ CTR MDA/IC
Sent: Monday, October 08, 2012 7:57 AM
To: arslist@ARSLIST.ORG
Subject: Re: Results of a application pen-test - need to close holes

Dan,
1 - Privilege Escalation - I can't speak to the service catalog (I think that's 
by design)...but if you need the preference record to be only viewable by 
themselves, you could change the permission on field 1 to only allow the 
'Submitter' group access.  This isn't a case of privilege escalation, simply a 
case of being able to do something the evaluator felt they shouldn't be able to 
do

2 - Improper Error Handling - Yes and No...I vaguely understand the concern, 
but I'm not entirely seeing the 'attack vector' based on the content of the 
messages

3 - No Session Timeout - Already addressed

4 - Concurrent User Sessions - Already addressed

5 - Forced Browsing - I'm not familiar with the ability to get into forms 
without authentication, but you could look into applying a 'filter' to your 
tomcat 'arsys' context, thus enabling forced authentication at the web 
serverideally you would want this authentication to be automatic (SSO) so 
that you don't first need to authenticate to the context, then ALSO need to log 
onto the remedy app...that would simply be annoying to the users

6 - Autocomplete - Already addressed

7 - Banner Grabbing - I have no information about this one...sorry, hopefully 
someone else can assist.

-Original Message-
From: Action Request System discussion list(ARSList) 
[mailto:arslist@ARSLIST.ORG] On Behalf Of Dan Miller
Sent: Sunday, October 07, 2012 4:15 AM
To: arslist@ARSLIST.ORG
Subject: Results of a application pen-test - need to close holes

Hi forum,

I hope you can help, and I am sorry in advance for the long post, but I am 
trying to get all this into one post, hoping that someone has gone through this 
exercise before.  So basically, we had an application pen-test before releasing 
our remedy platform to the public internet.  We got 7 things that we need to 
fix, some of them before we can go live, others that can wait a while.

Summary:

1.  Privilege Escalation
2.  Improper Error Handling
3.  No session time out
4.  Concurrent User Sessions
5.  Forced Browsing
6.  Autocomplete feature
7.  Banner Grabbing

Below I have described them a little more with description, recommendation, but 
also the problem I have in getting them implemented.  We are 18 months into our 
first ever Remedy journey, so security is something we have not really 
considered.

Can you please help?


1. Privilege Escalation
--

Description:
-
Privilege escalation in Remedy application allows a user to gain elevated 
access to resources that are meant a privileged user.  It was observed that in 
Remedy a user can view / read other user’s Service catalogue and preference 
details.  The privilege values should be checked from the database and not be 
stored in a client side cookie.
Vulnerable Urls:
 
https://hostname/arsys/forms/server-mame/SRS%3ACFGApplicationPreferences/Dialog+Console/?cacheid=aeabdc61format=html
 https:// 
hostname/arsys/forms/server-mame/SRS%3AServiceRequestConsole/enduser/?cacheid=1bc6c61format=html
 https:// hostname /arsys/atrium/ServiceCatalog.swf 

this means the user can get more rights than they are entitled too. In this 
case a test user was able to see other users preferences, this may need to go 
back to BMC if TT are unable to resolve as it may be an application fault. 
Recommended fix is to enable server side authentication and not client side 
which is currently in place.

Recommendation:
-
It is strongly recommended to check the privilege values from the database 
before granting access to secured recourses applications.

Problem:

How do I even start with this one….  Is there something I am not doing in terms 
of application lock down?  Is it something to do with object-list within 
mid-tier so URLs can be directly browsed to?


2. Improper Error Handling
---
Description
---
If a web application encounters an error condition it may need to display an 
appropriate error message. Sometimes these messages can be detailed enough to 
give away crucial information about the application. This information may 
include database schema/table names, user names, platform specific information 
etc. Applications giving out detailed error messages run the risk of  exposing 
crucial information which can be used later to launch further attacks.

Our Remedy installation seems to have

Re: Results of a application pen-test - need to close holes

2012-10-08 Thread Axton
The CWE database does a good job of enumerating and outlining various
weaknesses in applications.  For this specific case, see CWE-209.

http://cwe.mitre.org/data/definitions/209.html

The pen-testing tools that are out there wrap around these commonly agreed
upon weaknesses to generate a report of issues or potential issues.  Manual
pen-testing takes the same approach.

Axton Grams

On Mon, Oct 8, 2012 at 8:46 AM, Longwing, LJ CTR MDA/IC 
lj.longwing@mda.mil wrote:

 John,
 I would personally be more concerned about someone having a 'clone' of my
 system and gaining more information than them being able to glean much from
 error messages.  Yes, I understand that an error message from the
 underlying vendor db (SQL Server) for example tells them what DB you are
 running onbut I've never been exceedingly concerned about that...I
 guess I've never been in a position where the system I support is so
 critical that someone is going to attack it and any little piece of
 information provides another nugget of capability to exploit.

 Being in DOD contracting I understand the concerns for security and such,
 I'm just not sure what they would be do with something like the error they
 described.

 -Original Message-
 From: Action Request System discussion list(ARSList) [mailto:
 arslist@ARSLIST.ORG] On Behalf Of John Baker
 Sent: Monday, October 08, 2012 7:36 AM
 To: arslist@ARSLIST.ORG
 Subject: Results of a application pen-test - need to close holes

 LJ,

 2. Improper error handling

 The concern would be that the SQL message may reveal information that
 allows a third party to establish the type of database, IP address, etc.
 They would then be in a position to mount an attack with information known
 about that database, ie current security concerns etc.

 5. Forced browsing

 You correctly identify a good SSO deployment (ie the JSS SSO Plugin :-) as
 a solution to forced browsing, ie ensuring the user has authenticated
 before being able to access a resource.




 John


 ___
 UNSUBSCRIBE or access ARSlist Archives at www.arslist.org attend wwrug12
 www.wwrug12.com ARSList: Where the Answers Are


 ___
 UNSUBSCRIBE or access ARSlist Archives at www.arslist.org
 attend wwrug12 www.wwrug12.com ARSList: Where the Answers Are


___
UNSUBSCRIBE or access ARSlist Archives at www.arslist.org
attend wwrug12 www.wwrug12.com ARSList: Where the Answers Are


Re: Results of a application pen-test - need to close holes

2012-10-08 Thread Doug Blair
Listers,

Sounds to me like you guys need to set a Birds of a Feather session about 
hardening the MidTier for use on the public Internet at WWRUG12 next week, huh? 
WWRUG12 has more than a hundred sessions this year, and some of them will touch 
on security issues, but what better way to bring together all of this expertise 
and interest?

Of course, this would be the very first time that a bunch of experts, 
interested parties, customers, software designers and engineers changed the 
world with a couple of beers! 

We'll buy the first round :-). Second one too if it helps.

Seriously, the number of presentation topics and the breath of the curriculum 
has been impressive this year, but even with all this expertise we cannot think 
of or organize every single thing you might want to talk about. We can, 
however, bring all of this talent to the same place and time. The number of ad 
hoc conversations at WWRUG's, BMC User World's and RUG's in their day just 
doesn't happen in other forums. So, in addition to all the formal instruction 
and shared knowledge, the opportunity to organize your own discussion among 
like interests is one of the best reasons to come to WWRUG.

See you in SanJose! Next week!

Doug

--
Doug Blair
+1 224-558-5462

Sent from my new iPad
Auto-corrected typos, misspellings and non-sequiturs are gratefully attributed 
to Steve Jobs :-)

On Oct 8, 2012, at 8:46 AM, Longwing, LJ CTR MDA/IC lj.longwing@mda.mil 
wrote:

 John,
 I would personally be more concerned about someone having a 'clone' of my 
 system and gaining more information than them being able to glean much from 
 error messages.  Yes, I understand that an error message from the underlying 
 vendor db (SQL Server) for example tells them what DB you are running 
 onbut I've never been exceedingly concerned about that...I guess I've 
 never been in a position where the system I support is so critical that 
 someone is going to attack it and any little piece of information provides 
 another nugget of capability to exploit.
 
 Being in DOD contracting I understand the concerns for security and such, I'm 
 just not sure what they would be do with something like the error they 
 described.
 
 -Original Message-
 From: Action Request System discussion list(ARSList) 
 [mailto:arslist@ARSLIST.ORG] On Behalf Of John Baker
 Sent: Monday, October 08, 2012 7:36 AM
 To: arslist@ARSLIST.ORG
 Subject: Results of a application pen-test - need to close holes
 
 LJ,
 
 2. Improper error handling
 
 The concern would be that the SQL message may reveal information that allows 
 a third party to establish the type of database, IP address, etc.
 They would then be in a position to mount an attack with information known 
 about that database, ie current security concerns etc.
 
 5. Forced browsing
 
 You correctly identify a good SSO deployment (ie the JSS SSO Plugin :-) as a 
 solution to forced browsing, ie ensuring the user has authenticated before 
 being able to access a resource.
 
 
 
 
 John
 
 ___
 UNSUBSCRIBE or access ARSlist Archives at www.arslist.org attend wwrug12 
 www.wwrug12.com ARSList: Where the Answers Are
 
 ___
 UNSUBSCRIBE or access ARSlist Archives at www.arslist.org
 attend wwrug12 www.wwrug12.com ARSList: Where the Answers Are
 

___
UNSUBSCRIBE or access ARSlist Archives at www.arslist.org
attend wwrug12 www.wwrug12.com ARSList: Where the Answers Are


Results of a application pen-test - need to close holes

2012-10-07 Thread John Baker

Dan,

Without wishing to repeat John's feedback, much of what was highlighted 
needs to be tackled by BMC. However, there are a few items that puzzled me.


3. No session time out

The Mid Tier runs on a Java web server with the standard servlet engine 
session timeout, so there is a timeout on sessions. It's set in the Mid 
Tier configuration and is not per user, but Mid Tier instance wide. I 
suspect it was set to a high value and hence the pen testers concluded 
it wasn't set.


6. Auto-complete feature

I wasn't aware that the username/password is being stored in a cookie. 
Did they tell you which one?



John
--
SSO Plugin for BMC ITSM, Dashboards, Analytics.
http://www.javasystemsolutions.com/jss/ssoplugin

___
UNSUBSCRIBE or access ARSlist Archives at www.arslist.org
attend wwrug12 www.wwrug12.com ARSList: Where the Answers Are


Re: ADV: Re: [arslist] Results of a application pen-test - need to close holes

2012-10-07 Thread Dan Miller
hi John

are you going to be a WWRUG this year?

___
UNSUBSCRIBE or access ARSlist Archives at www.arslist.org
attend wwrug12 www.wwrug12.com ARSList: Where the Answers Are


Re: ADV: Re: [arslist] Results of a application pen-test - need to close holes

2012-10-07 Thread Dave Shellman
Dan,

Which John are you asking?

I know one that has replied on this thread is registered.  Another that replied 
is not, at least yet.

Dave
WWRUG12 Office Manager

On Oct 7, 2012, at 5:40 PM, Dan Miller dan.mil...@bt.com wrote:

 hi John
 
 are you going to be a WWRUG this year?
 
 ___
 UNSUBSCRIBE or access ARSlist Archives at www.arslist.org
 attend wwrug12 www.wwrug12.com ARSList: Where the Answers Are

___
UNSUBSCRIBE or access ARSlist Archives at www.arslist.org
attend wwrug12 www.wwrug12.com ARSList: Where the Answers Are


Re: ADV: Re: [arslist] Results of a application pen-test - need to close holes

2012-10-07 Thread John Sundberg
Dan,

I will be at WWRUG - I hope you are too.

To me - this is one of the great things of WWRUG - to share real life
stories...

Dan - if you are going - please find me -- we can chat about experiences -
and then you can help guide your company/team towards the solution that is
right for them.


-John



On Sun, Oct 7, 2012 at 4:40 PM, Dan Miller dan.mil...@bt.com wrote:

 hi John

 are you going to be a WWRUG this year?


 ___
 UNSUBSCRIBE or access ARSlist Archives at www.arslist.org
 attend wwrug12 www.wwrug12.com ARSList: Where the Answers Are




-- 

*John Sundberg*
Kinetic Data, Inc.
Your Business. Your Process.
*WWRUG10 Best Customer Service/Support Award*
*WWRUG09 Innovator of the Year Award*
*
*
651-556-0930 I john.sundb...@kineticdata.com
 www.kineticdata.com I community.kineticdata.com

___
UNSUBSCRIBE or access ARSlist Archives at www.arslist.org
attend wwrug12 www.wwrug12.com ARSList: Where the Answers Are