Patrick-Dussault

Tech Tip : CA Single Sign-On : SPS affwebservices/router/session resources vulnerable to an XXE injection attack

Discussion created by Patrick-Dussault Employee on Jul 6, 2017

Issue:

 

I'm running SPS and when reaching the following resource on it

https://myserver.mydomain.com/affwebservices/router/session

we've found a vulnerability to an XXE injection attack. Indeed an attacker exploiting this vulnerability is able to retrieve confidential data and access sensitive files on the server, e.g. the Linux "/etc/passwd" file when SPS runs on Linux.

 

Environment:

 

Policy Server 12.52SP1CR02 SPS 12.52SP1

 

Cause:

 

SiteMinder's "affwebservices" part contains two SOAP services: router and session. You can send a SOAP request to the endpoints with an external entity reference inside the parameter, this will cause an exception when the service tries to parse the contents of a requested system file (/etc/passwd, for example) into a valid date/timestamp. But the server response will show the content of the /etc/passwd file.

 

Resolution:

 

This issue is fixed in SPS 12.52SP1CR06

When hitting the URL, the browser should received return code 404

00424351 DE172435

CA Access Gateway is vulnerable to an XXE injection attack and able to retrieve confidential data and access sensitive files on the server, for example the "passwd" file.

 

defects fixed in 1252sp1cr06

KB : TEC1317181

Outcomes