SEC Consult Security Advisory < 20070509-0 >
title: Multiple vulnerabilites in Nokia Intellisync
Mobile Suite / Wireless Email Express (Information
/ Source Code Disclosure, Cross Site Scripting,
Denial of Service)
program: Nokia Intellisync Mobile Suite - Novell Groupwise
bundle & Nokia Intellisync Wireless Email Express
vulnerable version: 126.96.36.199, 188.8.131.52, 184.108.40.206
other versions were not tested!
by: Johannes Greil / SEC Consult / www.sec-consult.com
Nokia Intellisync Mobile Suite is a portfolio of products that reside on a single server and can be used alone or together to create a comprehensive mobility solution. The Nokia Intellisync Mobile Suite server provides large businesses with the flexibility, manageability and extensibility to connect virtually any corporate data to virtually any device over almost any network to meet both current and future mobility needs.
Note: According to Nokia Austria support the tested versions were a bundle version from Novell to support Groupwise functionality hence Novell is responsible (according to Nokia).
It seems there exist many different versions of the same or very similar product. During a short review of an installation of Nokia Intellisync Wireless Email Express it was found to be partially vulnerable too.
* The bundled Apache Tomcat v5.0.25 suffers from an information disclosure vulnerability which allows an attacker to view the directory listing and the source code of the application.
* Some ASP scripts under /usrmgr/ list all configured users including the mail server address with userid (but no password).
* Furthermore it is possible to deactivate all users and denial access to the system.
* Some ASP scripts are vulnerable to cross site scripting attacks.
An attacker does not need to be authenticated to perform those attacks!
1) Directory listing & source code information disclosure
It seems that (at least) versions v220.127.116.11, v18.104.22.168 and v22.214.171.124 are bundled with Apache Tomcat v5.0.25. This Tomcat version suffers from a known directory listing information disclosure vulnerability.
more information: www.securityfocus.com/bid/19106/info
The original advisory doesn't mention though that it is also possible to disclose the source code of the underlying applications!
Proof of concept:
Directory Listing: http:// $host/;.jsp Source Code Disclosure: http:// $host/en/logon.asp;.jsp
2) User accounts information disclosure
E.g., the following ASP scripts list all configured accounts:
Proof of concept:
userStatusList.asp outputs the following XML data for every account:
<f1>id</f1> <f2>name</f2> <f3>firstName</f3> <f4>lastName</f4> <f5>active</f5> <f6>server</f6> <f7>username</f7
userList.asp additionally lists the configured timezone instead of the server address.
As the login name is known now an attacker can guess/brute force every account and check for weak passwords.
3) Unauthenticated user account deactivation denial of service
It is possible to deny access to the system for every user account. The script "userList.asp" also has the functionality to update the accounts. An unauthenticated attacker can change the login name, first name, last name and time zone settings. One can also change the "active" dropdown to "false" which deactivates the account.
By changing the login name to an empty value it is possible to hide the user. Only the id will show up in the overview page. One can still login with this username and the associated password.
Proof of concept:
The following URL shows the update page of the user with id 42:
4) Cross site scripting
It is possible to conduct cross site scripting attacks as input is not properly filtered in many scripts. Not all scripts were tested, hence it is likely that there are many more vulnerable scripts.
Proof of concept:
http:// $host/de/pda/dev_logon.asp?username=<script>alert(42)</script>&password= http:// $host/usrmgr/registerAccount.asp (all fields) http:// $host/de/create_account.asp [...]
The following versions were found to be vulnerable:
Other versions of Nokia products have not been tested and may be
Nokia Austria support says they are not responsible for the tested Groupwise bundle edition and redirected us to Novell.
During a short test we discovered that Nokia Intellisync Wireless Email Express seems to be partially vulnerable too.
Vendor contact timeline:
2007-03-19: vendor (Nokia/Intellisync) notified via email
2007-03-20: no reply hence email to: email@example.com,
2007-03-20: sales replies and forwards to firstname.lastname@example.org
2007-03-20: sending advisory draft to email@example.com
2007-03-21: Nokia Austria support calls and needs more information
(because they didn't get the advisory)
2007-03-23: Nokia Austria support says the product is a bundle version
from Novell and they should be contacted
2007-03-23: contacted Novell regarding the issues (firstname.lastname@example.org)
2007-03-27: Novell anwsered, SR # 10328518153 has been created
2007-03-28: SR updated, vulnerability should be handled by Nokia
2007-04-02: asking about the status again
2007-04-10: SR updated, "Nokia is looking into the issue"
2007-04-17: Nokia ticket has been opened, no word on it
2007-04-20: Nokia tested "GMS 2" where the issues are not reproduceable
Due to the lack of a "GMS 2" installation it couldn't be verified whether the issues have been resolved by Nokia. It is also unknown whether there's a newer version of Wireless Email Express that is not affected or whether there are more vulnerable Nokia products/versions.
According to Nokia "GMS 2" is not affected, hence an upgrade is advised.
restrict access to /usrmgr/ and manually upgrade Tomcat if possible.
SEC Consult Unternehmensberatung GmbH
Tel.: +43 / 1 / 890 30 43 - 0
Fax.: +43 / 1 / 890 30 43 - 25
Mail: research at sec-consult dot com
SEC Consult conducts periodical information security workshops on ISO
27001/BS 7799 in cooperation with BSI Management Systems. For more
information, please refer to www.sec-consult.com/236.html
EOF Johannes Greil / @2007