Skip to content

XoruX STOR2RRD/LPAR2RRD - Monitoring accounts password exposure (CVE-2021-42370)

High
orange-cert-cc published GHSA-f3qp-4xqq-2wjx Nov 15, 2021

Package

LPAR2RRD (XoruX)

Affected versions

7.21

Patched versions

7.30
STOR2RRD (XoruX)
7.21
7.30

Description

Overview

Weak password configuration process in XoruX LPAR2RRD and STOR2RRD allows authenticated attackers having access to XoruX administration forms to collect the credentials used by XoruX to connect to monitored systems and reuse them in order to compromise them.

Details

The password fields in monitored services configuration pages contains the actual password currently used by XoruX to connect to these systems.
While these fields are HTML "password" input fields, it is trivial for an attacker to his browser's developper tools to change the field input type to "text" and get the password displayed in clear form.

Exploitation

Knowing the credentials used by XoruX to connect to the virtualization and storage infrastructure makes it trivial to spread the compromission once XoruX service has been compromized by simply reusing gathered credentials.

Solution

Security patch

XoruX fixed this vulnerability in STOR2RRD/LPAR2RRD 7.30

Workaround

Password configuration fields should only allow to set a new password for monitored services, they should not reveal the current one.

References

https://stor2rrd.com/note730.php
https://lpar2rrd.com/note730.php
https://nvd.nist.gov/vuln/detail/CVE-2021-42370

Credits

Orange CERT-CC
Simon GEUSEBROEK at Orange group

Timeline

Date reported: October 11, 2021
Date fixed: October 21, 2021

Severity

High
7.5
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CVE ID

CVE-2021-42370

Weaknesses