seeing is believing

Dell Quest One Password Manager CAPTCHA Bypass

Dell Quest One Password Manager CAPTCHA Bypass
Posted Oct 21, 2013
Authored by Johnny Bravo

The Quest One Password Manager simply fails to check the CAPTCHA submitted if the values do not accompany the payload.

tags | exploit
MD5 | f09ffe6b4a515e2831ff0608c52f9a67

Dell Quest One Password Manager CAPTCHA Bypass

Change Mirror Download
-= [ Disclosure ]=-
Filing Date: Today
Issue Tracking Numbah: 20747
Discoverorer: Johnny Bravo

-=[ Background ]=-
Quest made a password management web thing. Dell bought Quest. Dell
offers Quest One(tm) Password Manager for $5/user.
http://software.dell.com/products/password-manager/. (Oddly, this is
not a joke.)

-=[ Issue ]=-
To use the web application you need to know your domain, username, and
the value of the presented captcha. You submit that, correctly, and the
web application will present you with the user's full name and some
options.

Today we will just talk about that bit there. You do not need to
actually know the value of the captcha. Someone who is really bored
could easily enumerate logins and match them to a user's name.

-=[ Attack ]=-
On the POST request you can just remove the captcha bits. Pretty
fucking l33t. This is the kind of thing that HFG would produce. Or
maybe Gobbles. Or, more likely, se7en. And no, I didn't find this in
the "Snowden docs" although this may be an NSA backdoor... you decide!

On to the attack. The POST data normally includes the following
parameters:
ScenarioActionId=42696720-7368-6974-2070-726F64756374&UserName=domain%5Cu

ser&Search=false&CaptchaType=Captcha&UseCaptchaEveryTime=True&CaptchaResp

onse=SelfCleaningVagina

l33t hackers would send these parameters:
ScenarioActionId=42696720-7368-6974-2070-726F64756374&UserName=domain%5Cu

ser&Search=false

-=[ Fix ]=-
(This section is for the developers who wrote the software)
Write the code such that, oh, I don't know, it actually checks to
ensure the fucking captcha is used? Someone did this on one of the
other pages in the app. Perhaps use the code from there? If it's not
too much to ask that is.

(This section is for product owners)
Really, you bought this? Really? Really? Really?

(This section is for users)
Yes, that's right, any moron on the internets can discover your company
login id and pair that with your name if you work at a place
unfortunate enough to utilize this product. If your company doesn't
have resources to create this app themselves, they've probably
outsourced your helpdesk too, which means you're about to get pwn3d via
some fairly lame social engineering. Enjoy that.

-=[ Greetz ]=-
Dell, Quest, and the security company that either uses this shit
internally or resells it, or uses it and resells it.

Brought to youse guys by,
Johnny, Johnny Bravo

PS If you haven't seen my tips on picking up the chicks, check it out
on the youtube http://www.youtube.com/watch?v=xnGnl-UElVA.


Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

February 2015

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    2 Files
  • 2
    Feb 2nd
    17 Files
  • 3
    Feb 3rd
    15 Files
  • 4
    Feb 4th
    16 Files
  • 5
    Feb 5th
    14 Files
  • 6
    Feb 6th
    4 Files
  • 7
    Feb 7th
    0 Files
  • 8
    Feb 8th
    0 Files
  • 9
    Feb 9th
    0 Files
  • 10
    Feb 10th
    0 Files
  • 11
    Feb 11th
    0 Files
  • 12
    Feb 12th
    0 Files
  • 13
    Feb 13th
    0 Files
  • 14
    Feb 14th
    0 Files
  • 15
    Feb 15th
    0 Files
  • 16
    Feb 16th
    0 Files
  • 17
    Feb 17th
    0 Files
  • 18
    Feb 18th
    0 Files
  • 19
    Feb 19th
    0 Files
  • 20
    Feb 20th
    0 Files
  • 21
    Feb 21st
    0 Files
  • 22
    Feb 22nd
    0 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2015 Packet Storm. All rights reserved.

close