Novell is now a part of Micro Focus

My Favorites

Close

Please to see your favorites.

Security vulnerability with Identity Server allows remote code execution on system - CVE-2017-14803 and ZDI—CAN-5087

This document (7022443) is provided subject to the disclaimer at the end of this document.

Environment


Access Manager 4.3
Access Manager 4.4
Access Manager Identity Server
Connector Toolkit
ZDI—CAN-5087

Situation

A bug exists in Identity Server when accessing a basic SSO connector and downloading the BasicSSO connector plugins on IE11 where an attacker can execute arbitrary code on the system.

Resolution

Fixed in NAM 4.3.3 and NAM 4.4.0 HF1 patches.

For those on earlier 4.3 builds that want to workaround the issue, one can modify the IDP web.xml file and remove the following entry:


 <servlet>
  <servlet-name>downloadBasicSSOServlet</servlet-name>
  <servlet-class>com.netiq.ospui.server.OspUIBasicSSODownload</servlet-class>
</servlet>
<servlet-mapping>
  <servlet-name>downloadBasicSSOServlet</servlet-name>
  <url-pattern>/download</url-pattern>
</servlet-mapping>

Special thanks to rgod and kimiya working with Trend Micro's Zero Day
Initiative for responsibly disclosing this information.

Status

Security Alert

Disclaimer

This Support Knowledgebase provides a valuable tool for NetIQ/Novell/SUSE customers and parties interested in our products and solutions to acquire information, ideas and learn from one another. Materials are provided for informational, personal or non-commercial use within your organization and are presented "AS IS" WITHOUT WARRANTY OF ANY KIND.

  • Document ID:7022443
  • Creation Date:08-DEC-17
  • Modified Date:12-MAR-18
    • NetIQAccess Manager (NAM)

Did this document solve your problem? Provide Feedback