This is a post about an old vulnerability that I finally found the time to blog about. It dates back to 2014, but from a technical point of view it is nevertheless interesting: An XML parser that tries to fix structural errors in a document caused a DoS problem.
All previous posts of this series focused on XSS. This time, we present a vulnerability which is connected another Cloud Management Platform: OpenNebula. This Infrastructure-as-a-Service platform started as a research project in 2005. It is used by information technology companies like IBM, Dell and Akamai as well as academic institutions and the European Space Administrations (ESA). By relying on standard Linux tools as far as possible, OpenNebula reaches a high level of customizability and flexibility in hypervisors, storage systems, and network infrastructures. OpenNebula is distributed using the Apache-2 license.
OpenNebula offers a broad variety of interfaces to control a cloud. This post focuses on Sunstone, OpenNebula's web interface (see Figure 1).
Before OpenNebula 4.6.2, Sunstone had no Cross-Site Request Forgery (CSRF) protection. This is a severe problem. Consider an attacker who lures a victim into clicking on a malicious link while being logged in at a private cloud. This enables the attacker to send arbitrary requests to the private cloud through the victims browser. However, we could find other bugs in OpenNebula that allowed us to perform much more sophisticated attacks.
OpenNebula saves the incorrectly generated XML document in a database. The next time the OpenNebula core retrieves information about that particular VM from the database the XML parser is mixed up and runs into an error because it only expects a string as name, not an XML tree. As a result, Sunstone cannot be used to control the VM anymore. The Denial-of-Service attack can only be reverted from the command line interface of OpenNebula.
This bug can be triggered by a CSRF-attack, which means that it is a valid attack against a private cloud: By luring a victim onto a maliciously crafted website while logged in into Sunstone, an attacker can make all the victim's VMs uncontrollable via Sunstone. A video of the attack can be seen here:
This bug has been fixed in OpenNebula 4.6.2.
This result is a collaborative work together with Mario Heiderich. It has been published at ACM CCSW 2015. The paper can be found here.
Read moreAll previous posts of this series focused on XSS. This time, we present a vulnerability which is connected another Cloud Management Platform: OpenNebula. This Infrastructure-as-a-Service platform started as a research project in 2005. It is used by information technology companies like IBM, Dell and Akamai as well as academic institutions and the European Space Administrations (ESA). By relying on standard Linux tools as far as possible, OpenNebula reaches a high level of customizability and flexibility in hypervisors, storage systems, and network infrastructures. OpenNebula is distributed using the Apache-2 license.
OpenNebula offers a broad variety of interfaces to control a cloud. This post focuses on Sunstone, OpenNebula's web interface (see Figure 1).
Figure 1: OpenNebula's Sunstone Interface displaying a VM's control interface |
Before OpenNebula 4.6.2, Sunstone had no Cross-Site Request Forgery (CSRF) protection. This is a severe problem. Consider an attacker who lures a victim into clicking on a malicious link while being logged in at a private cloud. This enables the attacker to send arbitrary requests to the private cloud through the victims browser. However, we could find other bugs in OpenNebula that allowed us to perform much more sophisticated attacks.
Denial-of-Service on OpenNebula-VM
At its backend, OpenNebula manages VMs with XML documents. A sample for such an XML document looks like this:<VM>OpenNebula 4.6.1 contains a bug in the sanitization of input for these XML documents: Whenever a VM's name contains an opening XML tag (but no corresponding closing one), an XML generator at the backend automatically inserts the corresponding closing tag to ensure well-formedness of the resulting document. However, the generator outputs an XML document that does not comply with the XML schema OpenNebula expects. The listing below shows the structure that is created after renaming the VM to 'My <x> VM':
<ID>0</ID>
<NAME>My VM</NAME>
<PERMISSIONS>...</PERMISSIONS>
<MEMORY>512</MEMORY>
<CPU>1</CPU>
...
</VM>
<VM>The generator closes the <x> tag, but not the <NAME> tag. At the end of the document, the generator closes all opened tags including <NAME>.
<ID>0</ID>
<NAME>My <x> VM</x>
<PERMISSIONS>...</PERMISSIONS>
<MEMORY>512</MEMORY>
<CPU>1</CPU>
...
</NAME>
</VM>
OpenNebula saves the incorrectly generated XML document in a database. The next time the OpenNebula core retrieves information about that particular VM from the database the XML parser is mixed up and runs into an error because it only expects a string as name, not an XML tree. As a result, Sunstone cannot be used to control the VM anymore. The Denial-of-Service attack can only be reverted from the command line interface of OpenNebula.
This bug can be triggered by a CSRF-attack, which means that it is a valid attack against a private cloud: By luring a victim onto a maliciously crafted website while logged in into Sunstone, an attacker can make all the victim's VMs uncontrollable via Sunstone. A video of the attack can be seen here:
This bug has been fixed in OpenNebula 4.6.2.
This result is a collaborative work together with Mario Heiderich. It has been published at ACM CCSW 2015. The paper can be found here.
- Hacker Tools For Mac
- Install Pentest Tools Ubuntu
- Hacking Tools Windows
- Top Pentest Tools
- Nsa Hacker Tools
- Pentest Tools Apk
- Pentest Tools List
- Pentest Recon Tools
- Hacker Tools Hardware
- Pentest Box Tools Download
- Hacker Tools Apk Download
- Hack Tools For Pc
- Pentest Tools Kali Linux
- Pentest Tools List
- Hacker Tools Free Download
- Pentest Tools Github
- Best Hacking Tools 2019
- Pentest Box Tools Download
- Kik Hack Tools
- Hacker Tools For Windows
- Pentest Tools For Ubuntu
- Hacker Techniques Tools And Incident Handling
- Hacker Tools Apk Download
- Hacker Tools Linux
- Hack Apps
- Pentest Tools Free
- Top Pentest Tools
- Pentest Tools Download
- Hacking Tools And Software
- Hacker Tools Mac
- Wifi Hacker Tools For Windows
- Hacker Tools For Pc
- Hacker Tools Apk
- Pentest Tools Online
- Install Pentest Tools Ubuntu
- Hak5 Tools
- Pentest Tools Github
- Hacker Tools Mac
- Hack Tools 2019
- Ethical Hacker Tools
- What Are Hacking Tools
- Hack Tool Apk No Root
- Pentest Tools Download
- Github Hacking Tools
- Hackrf Tools
- Hacker Tools Online
- Hacking Tools Hardware
- Hacking Tools Online
- Pentest Reporting Tools
- Hacker Tools List
- Hacker Tools For Pc
- Nsa Hack Tools
- Hacker
- Hacking Apps
- Hacking Tools Kit
- Nsa Hacker Tools
- Hack Tools For Pc
- Underground Hacker Sites
- Hacker Tools Linux
- Best Hacking Tools 2020
- Pentest Tools Find Subdomains
- Hack Tool Apk
- Hack Tools For Mac
- Hack Tools Download
- Hacking Tools For Pc
- Hacker Tools For Windows
- Hacker Tools
- Usb Pentest Tools
- Black Hat Hacker Tools
- Hacker Techniques Tools And Incident Handling
- Hak5 Tools
- Ethical Hacker Tools
- Hacker Tools Online
- Hacking Tools Hardware
- Hack Tools Github
- Wifi Hacker Tools For Windows
- Hacker Tools Hardware
- Pentest Tools Website Vulnerability
- Hak5 Tools
- Hacker Search Tools
- Hacking Tools For Windows Free Download
- Hacker Tools Software
- Hacking Tools Kit
- Pentest Tools For Mac
- New Hack Tools
- Black Hat Hacker Tools
- Hacker Tools Mac
- Hackers Toolbox
- Hacker Tools Hardware
- Hacker Tools Windows
- Hacking Tools Mac
- Pentest Tools For Android
- Hackrf Tools
- Hacker Techniques Tools And Incident Handling
- Hacker Tools Free
- Install Pentest Tools Ubuntu
- Hackers Toolbox
- Hack Tools For Pc
- Pentest Tools Alternative
- Pentest Tools For Android
- Nsa Hack Tools Download
- Pentest Reporting Tools
- Pentest Recon Tools
- Pentest Box Tools Download
- Hack Tools Mac
- Kik Hack Tools
- Hacking Tools And Software
- Pentest Tools Website Vulnerability
- Hacking Tools Windows
- Nsa Hacker Tools
- Pentest Tools Tcp Port Scanner
- Pentest Tools Open Source
- Pentest Tools Subdomain
- Pentest Tools Port Scanner
- Hacking Tools Pc
- Hacker Tools For Windows
- Hacker Tools For Ios
- Game Hacking
- Hacks And Tools
- Hacking Tools For Windows
- Hacks And Tools
- Pentest Tools Port Scanner
- Hack Tool Apk No Root
- Hack Tools Download
- Hacking Tools Windows
- Nsa Hack Tools
- Hacker Tools 2020
- Pentest Tools Port Scanner
- Underground Hacker Sites
- Hack Tools For Ubuntu
- Pentest Tools Subdomain
- Hacking Tools
- Hacker Security Tools
- Hacking Tools Name
- Hacking Tools For Windows Free Download
- Hacker Tools Mac
- Hacking Tools 2019
- Pentest Tools Online
- Hack Apps
- Pentest Tools Framework
- Nsa Hack Tools Download
- Hacker Tools 2019
No comments:
Post a Comment