23th Jan 2003 [SBWID-5945]
COMMAND
Blackboard Password Retrieval
SYSTEMS AFFECTED
Blackboard Learning System 5.x, level 1 and 2 are affected
UNAFFECTED: Clients who are using our Enterprise product capability of
completely externalizing external authentication, and have implemented
Blackboard Learning System, Level 3 using LDAP, Kerberos, Active
Directory, or Active Directory are unaffected.
PROBLEM
Pedram Amini [[email protected]] found :
--snip--
Improper filtering in the address book search feature allows an
attacker to inject SQL statements into a query that is executed with
read access to the users table. The address book search feature is
implemented by /bin/common/search.pl and the improperly filtered
argument is "by". It is a trivial matter for an attacker to construct
queries that will return a listing of all users with a given password.
It is also possible for an attacker to execute a scripted attack that
can extract the MD5 hashed password of a specific user.
A valid account is not required to exploit the above-described
vulnerabilities. Most (all?) organizations have a "preview" button on
the login screen allowing anyone to login to a restricted version of
the system. Preview users are not given an interface to the address
book. However, despite the fact that the address book is "hidden" from
preview users, it is not actually restricted. The scripts required in
exploitation are indeed accessible to the preview user thereby opening
the window of exploitation to any remote user.
A more detailed and technical explanation of the vulnerability is
available at :
http://pedram.redhive.com/advisories/blackboard5.txt
SOLUTION
A security hotfix is now available through Blackboard that will address
recently identified issues related to the Blackboard User Directory.
Although there have been no reported security breaches, Blackboard
would like to share this important information with clients. For
locally installed clients running on release 5.5.1 or later (including
Blackboard Learning System - ML), the recommended solution is to obtain
the hotfix by calling Blackboard Product Support at 1-888-788-5264 or
by submitting a service request ticket through the Blackboard Product
Support Web site. For locally installed clients running on releases
earlier than 5.5.1, the recommended solution is to upgrade to 5.5.1 and
then apply the hotfix. To upgrade to release 5.5.1, system
administrators can go to http://behind.blackboard.com and click on the
"Hotfixes and Updates" icon to obtain the download. Once release 5.5.1
has been installed, you may obtain the hotfix by calling Blackboard
Product Support at 1-888-788-5264 (+1-202-715-6019 for international
clients); or by submitting a service request ticket through the
Blackboard Product Support Web site.
For all Learning System and Learning and Community Portal System
(formerly Blackboard 5 Level Three) clients running on releases earlier
than 5.5.1, please contact your Account Manager, at 202-463-4860 prior
to upgrading.
Clients running on Blackboard CourseInfo need not take action at this
time, as the potential security vulnerability does not affect this
platform.
Clients running on the Blackboard Transaction System are unaffected.