Symantec Access Management

Tech Tip : CA Single Sign-On : SPS affwebservices/router/session resources vulnerable to an XXE injection attack

  • 1.  Tech Tip : CA Single Sign-On : SPS affwebservices/router/session resources vulnerable to an XXE injection attack

    Broadcom Employee
    Posted Jul 06, 2017 09:31 AM

    Issue:

     

    I'm running SPS and when reaching the following resource on it

    https://myserver.mydomain.com/affwebservices/router/session

    we've found a vulnerability to an XXE injection attack. Indeed an attacker exploiting this vulnerability is able to retrieve confidential data and access sensitive files on the server, e.g. the Linux "/etc/passwd" file when SPS runs on Linux.

     

    Environment:

     

    Policy Server 12.52SP1CR02 SPS 12.52SP1

     

    Cause:

     

    SiteMinder's "affwebservices" part contains two SOAP services: router and session. You can send a SOAP request to the endpoints with an external entity reference inside the parameter, this will cause an exception when the service tries to parse the contents of a requested system file (/etc/passwd, for example) into a valid date/timestamp. But the server response will show the content of the /etc/passwd file.

     

    Resolution:

     

    This issue is fixed in SPS 12.52SP1CR06

    When hitting the URL, the browser should received return code 404

    00424351 DE172435

    CA Access Gateway is vulnerable to an XXE injection attack and able to retrieve confidential data and access sensitive files on the server, for example the "passwd" file.

     

    defects fixed in 1252sp1cr06

    KB : TEC1317181