-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Rapid7, Inc. Security Advisory Visit http://www.rapid7.com/ to download NeXpose, the world's most advanced vulnerability scanner. Linux and Windows 2000/XP versions are available now! _______________________________________________________________________ Rapid7 Advisory R7-0014 RSA SecurID ACE Agent Cross Site Scripting Published: June 18, 2003 Revision: 1.0 http://www.rapid7.com/advisories/R7-0014.html CVE: CAN-2003-0389 1. Affected system(s): KNOWN VULNERABLE: o RSA ACE/Agent version 5.0 for Windows o RSA ACE/Agent version 5.x for Web 2. Summary RSA SecurID provides authentication and access control using the RSA SecurID two-factor authentication framework. RSA SecurID two-factor authentication is based on something you know (such as a password or a PIN) and something you have (an authenticator such as a smart card). RSA ACE/Server provides RSA SecurID access control for enterprises. RSA provides several RSA ACE/Agents for use with RSA ACE/Server. These agents provide integrated RSA SecurID access control for 3rd-party server platforms including Microsoft Windows, IIS, UNIX servers (PAM), Apache, and Lotus Domino. The RSA ACE/Agent allows sites to protect web resources by requiring RSA SecurID authentication. Web browsers are automatically redirected to an authentication page where the user is required to authenticate with their RSA SecurID token before they can access protected resources. This secure redirect function of the RSA ACE/Agents protecting IIS, Apache, or SunONE web servers contains a cross-site scripting vulnerability. The redirector does not properly escape special characters, so requests for a URL containing special script characters will cause the ACE/Agent to emit a page containing web script which would execute in the user's browser. An attacker could potentially use this to fool unsuspecting users into entering their passphrase information, which could then be replayed by the attacker to the protected server to gain access. 3. Vendor status and information RSA Security, Inc. http://www.rsasecurity.com The vendor has been notified. This issue had already been discovered and fixed by RSA Security in an internal audit. The fix was released to customers in February 2003. 4. Solution Update to the latest version of RSA ACE/Agent for Windows - version 5.0.1 or RSA ACE/Agent for Web - version 5.1.1. Specific hot fixes and readme files can be downloaded from the following FTP sites: Customers using the RSA ACE/Agent 5.0 for Windows: RSA Security FTP Site (URL is wrapped to next line): ftp://ftp.rsasecurity.com /support/Patches/Ace/Agent/5.0.1_Agent/Win_Agent501.zip Customers using the RSA ACE/Agent 5.1 for Web: RSA Security FTP Site (URL is wrapped to next line): ftp://ftp.rsasecurity.com /support/Patches/Ace/Agent/5.1.1_Agent/WebAgent5.1.1.tar.gz 5. Detailed analysis Requests for paths containing special characters will cause these special characters to be emitted in the resulting redirect page. An attacker could potentially use the resulting script to quietly redirect users to his own website, where users would be tricked into entering their passphrase information. For example, the following session illustrates how to redirect the browser: $ telnet www.example.foo 80 Connected to www.example.foo. Escape character is '^]'. GET /"> HTTP/1.0 HTTP/1.1 200 OK Server: Microsoft-IIS/5.0 Content-Type: text/html