IBM Tivoli Management Framework Endpoint addr URL Default Credentials - Nessus

High   Plugin ID: 54987

This page contains detailed information about the IBM Tivoli Management Framework Endpoint addr URL Default Credentials Nessus plugin including available exploits and PoCs found on GitHub, in Metasploit or Exploit-DB for verifying of this vulnerability.

Plugin Overview


ID: 54987
Name: IBM Tivoli Management Framework Endpoint addr URL Default Credentials
Filename: tivoli_endpoint_default_creds.nasl
Vulnerability Published: 2011-06-07
This Plugin Published: 2011-06-07
Last Modification Time: 2018-08-15
Plugin Version: 1.9
Plugin Type: remote
Plugin Family: Web Servers
Dependencies: tivoli_endpoint_detect.nasl
Required KB Items [?]: www/tivoli_endpoint
Excluded KB Items: global_settings/supplied_logins_only

Vulnerability Information


Severity: High
Vulnerability Published: 2011-06-07
Patch Published: N/A
CVE [?]: N/A
CPE [?]: cpe:/a:ibm:tivoli_management_framework
Default Account Vulnerability: True

Synopsis

It is possible to authenticate to the remote server using the default credentials.

Description

The remote Tivoli Endpoint installation is secured by default credentials. Nessus is able to make authenticated requests to '/addr' by using the username 'tivoli' and password 'boss', which are hard-coded in the server executable.

A remote, unauthenticated attacker could change the endpoint's configuration or disable the web interface by using these default credentials.

Solution

Disable the ability to change endpoint configuration from the browser using the 'http_disable' configuration setting. Refer to the IBM documentation for more information.

Public Exploits


Target Network Port(s): N/A
Target Asset(s): N/A
Exploit Available: True (Metasploit Framework)
Exploit Ease: Exploits are available

Here's the list of publicly known exploits and PoCs for verifying the IBM Tivoli Management Framework Endpoint addr URL Default Credentials vulnerability:

  1. Metasploit: exploit/windows/http/ibm_tivoli_endpoint_bof
    [IBM Tivoli Endpoint Manager POST Query Buffer Overflow]

Before running any exploit against any system, make sure you are authorized by the owner of the target system(s) to perform such activity. In any other case, this would be considered as an illegal activity.

Risk Information


CVSS V2 Vector [?]: AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS Base Score:7.5 (High)
Impact Subscore:6.4
Exploitability Subscore:10.0
CVSS Temporal Score:NA (None)
CVSS Environmental Score:NA (None)
Modified Impact Subscore:NA
Overall CVSS Score:7.5 (High)

Go back to menu.

Plugin Source


This is the tivoli_endpoint_default_creds.nasl nessus plugin source code. This script is Copyright (C) 2011-2018 Tenable Network Security, Inc.

#
# (C) Tenable Network Security, Inc.
#


include("compat.inc");


if (description)
{
  script_id(54987);
  script_version("1.9");
  script_cvs_date("Date: 2018/08/15 16:35:43");

  script_xref(name:"EDB-ID", value:"17365");

  script_name(english:"IBM Tivoli Management Framework Endpoint addr URL Default Credentials");
  script_summary(english:"Tries to access a protected page as tivoli:boss");

  script_set_attribute(
    attribute:"synopsis",
    value:
"It is possible to authenticate to the remote server using the default
credentials."
  );
  script_set_attribute(
    attribute:"description",
    value:
"The remote Tivoli Endpoint installation is secured by default
credentials.  Nessus is able to make authenticated requests to '/addr'
by using the username 'tivoli' and password 'boss', which are
hard-coded in the server executable.

A remote, unauthenticated attacker could change the endpoint's
configuration or disable the web interface by using these default
credentials."
  );
  script_set_attribute(attribute:"see_also",value:"http://www.nessus.org/u?931779eb");
  script_set_attribute(
    attribute:"solution",
    value:
"Disable the ability to change endpoint configuration from the browser
using the 'http_disable' configuration setting.  Refer to the IBM
documentation for more information."
  );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");
  script_set_attribute(attribute:"metasploit_name", value:'IBM Tivoli Endpoint Manager POST Query Buffer Overflow');
  script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");

  script_set_attribute(attribute:"vuln_publication_date", value:"2011/06/07");
  script_set_attribute(attribute:"plugin_publication_date", value:"2011/06/07");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:ibm:tivoli_management_framework");
  script_set_attribute(attribute:"default_account", value:"true");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Web Servers");

  script_copyright(english:"This script is Copyright (C) 2011-2018 Tenable Network Security, Inc.");

  script_dependencies("tivoli_endpoint_detect.nasl");
  script_require_keys("www/tivoli_endpoint");
  script_exclude_keys("global_settings/supplied_logins_only");

  exit(0);
}


include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");
include("webapp_func.inc");


port = get_http_port(default:9495, embedded:TRUE);

install = get_install_from_kb(appname:'tivoli_endpoint', port:port, exit_on_fail:TRUE);

if (supplied_logins_only) audit(AUDIT_SUPPLIED_LOGINS_ONLY);

url = '/addr';
user = 'tivoli';
pass = 'boss';
auth_header = make_array('Authorization', 'Basic ' + base64(str:user + ':' + pass));

res = http_send_recv3(
  method:'POST',
  port:port,
  item:'/addr',
  exit_on_fail:TRUE,
  add_headers:auth_header
);

if ('Performing requested operation' >< res[2])
{
  if (report_verbosity > 0)
  {
    header = 'Nessus was able to POST to the following URL using the default credentials';
    trailer =
      '  Username : ' + user + '\n' +
      '  Password : ' + pass;
    report = get_vuln_report(items:url, port:port, header:header, trailer:trailer);
    security_hole(port:port, extra:report);
  }
  else security_hole(port);

}
else audit(AUDIT_WEB_APP_NOT_AFFECTED, "Tivoli Endpoint", build_url(qs:install['dir'], port:port));

The latest version of this script can be found in these locations depending on your platform:

  • Linux / Unix:
    /opt/nessus/lib/nessus/plugins/tivoli_endpoint_default_creds.nasl
  • Windows:
    C:\ProgramData\Tenable\Nessus\nessus\plugins\tivoli_endpoint_default_creds.nasl
  • Mac OS X:
    /Library/Nessus/run/lib/nessus/plugins/tivoli_endpoint_default_creds.nasl

Go back to menu.

How to Run


Here is how to run the IBM Tivoli Management Framework Endpoint addr URL Default Credentials as a standalone plugin via the Nessus web user interface (https://localhost:8834/):

  1. Click to start a New Scan.
  2. Select Advanced Scan.
  3. Navigate to the Plugins tab.
  4. On the top right corner click to Disable All plugins.
  5. On the left side table select Web Servers plugin family.
  6. On the right side table select IBM Tivoli Management Framework Endpoint addr URL Default Credentials plugin ID 54987.
  7. Specify the target on the Settings tab and click to Save the scan.
  8. Run the scan.

Here are a few examples of how to run the plugin in the command line. Note that the examples below demonstrate the usage on the Linux / Unix platform.

Basic usage:

/opt/nessus/bin/nasl tivoli_endpoint_default_creds.nasl -t <IP/HOST>

Run the plugin with audit trail message on the console:

/opt/nessus/bin/nasl -a tivoli_endpoint_default_creds.nasl -t <IP/HOST>

Run the plugin with trace script execution written to the console (useful for debugging):

/opt/nessus/bin/nasl -T - tivoli_endpoint_default_creds.nasl -t <IP/HOST>

Run the plugin with using a state file for the target and updating it (useful for running multiple plugins on the target):

/opt/nessus/bin/nasl -K /tmp/state tivoli_endpoint_default_creds.nasl -t <IP/HOST>

Go back to menu.

References


See also: Similar and related Nessus plugins:
  • 54924 - IBM Tivoli Management Framework Endpoint addr URL Remote Buffer Overflow
  • 80479 - IBM Tivoli Access Manager for e-Business < 6.0.0.33 / 6.1.0.14 / 6.1.1.10 SSL Multiple Vulnerabilities
  • 54943 - IBM Tivoli Directory Server SASL Bind Request Buffer Overflow (uncredentialed check)
  • 53625 - IBM Tivoli Directory Server Vulnerabilities (credentialed check)
  • 80481 - IBM Tivoli Directory Server < 6.0.0.72 / 6.1.0.55 / 6.2.0.30 / 6.3.0.22 with GSKit < 7.0.4.45 / 8.0.14.27 TLS Side-Channel Timing Information Disclosure
  • 80482 - IBM Security Directory Server < 6.1.0.61 / 6.2.0.36 / 6.3.0.30 / 6.3.1.2 with GSKit < 7.0.4.50 / 8.0.50.20 SSL CPU Utilization DoS
  • 58389 - IBM Tivoli Provisioning Manager Express for Software Distribution Isig.isigCtl.1 ActiveX RunAndUploadFile Method Boundary Error Remote Overflow
  • 66270 - IBM Tivoli Endpoint Manager Server < 8.2.1372 Multiple Vulnerabilities
  • 79335 - IBM Tivoli Endpoint Manager Server 9.1.x < 9.1.1117.0 OpenSSL Security Bypass
  • 25005 - IBM Tivoli Provisioning Manager OS Deployment Multiple Unspecified Input Validation Vulnerabilities
  • 25149 - IBM Tivoli Provisioning Manager OS Deployment Multiple Stack Overflows
  • 26187 - IBM Tivoli Storage Manager Client Multiple Vulnerabilities (swg21268775)
  • 42824 - IBM Tivoli Storage Manager Client Multiple Vulnerabilities (swg21405562)
  • 25662 - IBM Tivoli Storage Manager Multiple Remote Overflows
  • 77116 - IBM Tivoli Storage Manager Server 5.5.x Multiple Vulnerabilities
  • 77117 - IBM Tivoli Storage Manager Server 6.1.x Multiple Vulnerabilities
  • 77118 - IBM Tivoli Storage Manager Server 6.2.x < 6.2.6.0 Multiple Vulnerabilities
  • 77120 - IBM Tivoli Storage Manager Server 6.3.x < 6.3.4.200 Information Disclosure

Version


This page has been produced using Nessus Professional 10.1.2 (#68) LINUX, Plugin set 202205072148.
Plugin file tivoli_endpoint_default_creds.nasl version 1.9. For more plugins, visit the Nessus Plugin Library.

Go back to menu.