(,)(,.'.')('.',).,('.()((_,).'),) _ _,/_____// _\________ _____
\____\==//_\\ _/ ___\/_ \ / \
/ \/|\\\__(<_>)YY\
/______/\___|__/ \___>____/|__|_|/
\/ \/.-.\/ \/:wq
(x.0)
'=.|w|.='
_=''"''=.
presents..BlackBerryEnterpriseService12(BES12)Self-ServiceAffected versions:BES12<12.4CVE:CVE-2016-1914 and CVE-2016-1915PDF:
http://security-assessment.com/files/documents/advisory/Blackberry%20BES12%20Self-Service%20Multiple%20Vulnerabilities.pdf
+-----------+|Description|+-----------+BlackberryBES12 is an enterprise mobile management solution and
contains a self-service web application available tomobileusers. This
web application contains multiple vulnerabilities including
unauthenticated SQL
injection and reflected cross site scripting.
Limited access toan on-premise BES12 environment was provided during
the discovery of these vulnerabilities. The full impact of the
vulnerabilities in relation tocompromising other portions of the BES12
solution, such as mobile devices, is unclear.+------------+|Exploitation|+------------+*SQLInjection*TheJava servlet com.rim.mdm.ui.server.ImageServlet is vulnerable toSQL
injection via the imageName parameter. This servlet is exposed at
multiple paths and is used tofetch an image from the database:/mydevice/client/image
/admin/client/image
/myapps/client/image
/ssam/client/image
/all/client/image
This was discovered on a production BES12 on-premise deployment and the
injection vector allowed both UNION and stacked queries tobe executed
on the MicrosoftSQL server used by BES12. This allows full read/write
access tothe database, and can potentially result in command execution
via xp_cmdshell depending on the database user configuration.
The following proof of concept demonstrates an injection payload which
will select the entire obj_keystore_entry table. The query will
serialise the entire table into an XML document which is returned in the
HTTP response as UTF-16 without the leading BOM(byte order mark)
causing most text editors tofailtodisplay the response correctly.
https://<server>/mydevice/client/image?imageName=ui.cobranded.login.logo'+UNION+ALL+SELECT+NULL,NULL,NULL,NULL,NULL,(SELECT+*+FROM+obj_keystore_entry+FOR+XML+PATH(''))+--The technique above can be used todownload any database table available
totheBES12 database user.
Notable database tables are:* obj_user which contains BES12 user details.* obj_user_authentication which contains authentication tokens.* obj_user_device which based on column names, contains enrolment
tokens, enrolment secrets and device encryption keys.
It is unclear ifthis information is sufficient todecrypt a lost/stolen
BES12 mobile device.*ReflectedCrossSiteScripting*Two areas of the self-service web application exist where user-supplied
input is reflected directly in web pages, allowing a malicious user toconductCrossSiteScripting(XSS) attacks against users of the
application. While the application usestheHttpOnly cookie flag for
session tokens, successful exploitation allows malicious JavaScripttoperform any action within the application that the targeted user is able
to. The administrative web application is typically hosted on the same
domain and may be attacked using these XSS vectors, although this is
BES12 deployment specific.
The table below details where CrossSiteScripting was detected and
which parameters are vulnerable:
https://<server>/mydevice/index.jsp?locale="><script>alert(1)</script>
https://<server>/mydevice/loggedOut.jsp?locale="><script>alert(1)</script>+----------+|Solution|+----------+UpgradetoBES12.4.+-------------------+|DisclosureTimeline|+-------------------+Initial disclosure toBlackberry – 19Nov2015Disclosure receipt confirmed by Blackberry – 19Nov2015Requestfor update from Blackberry – 7Dec2015Vulnerabilities confirmed by Blackberry – 8Dec2015Blackberry confirms fixes will be released as part of BES12.4 – 28Jan2016BES12.4 released – 29Jan2016Advisory released – 15Feb2016+-----------------------------+|AboutSecurity-Assessment.com|+-----------------------------+Security-Assessment.com is a leading team of InformationSecurity
consultants specialising in providing high quality InformationSecurity
services toclients throughout the AsiaPacificregion. Our clients
include some of the largest globally recognised companies in areas such
as finance, telecommunications, broadcasting, legal and government. Our
aim is toprovide the very best independent advice and a high level of
technical expertise while creating long and lasting professional
relationships withourclients.
Security-Assessment.com is committed tosecurity research and
development, and its team continues toidentify and responsibly publish
vulnerabilities in public and private software vendor's products.
Members of the Security-Assessment.com R&D team are globally recognised
through their release of whitepapers and presentations related tonew
security research.
For further information on this issue or any of our service offerings,
contact us:Web www.security-assessment.com
Email info@security-assessment.com