Risks
Vulnerabilities
Browse by
Best Buy Employee Toolkit Vulnerability
19 August 2003
Bookmark and Share
From: <cmthemc(at)yahoo.com>

Title: URL Parsing and Plain Text Password disclosure in Best Buy Employee Toolkit Software
Provided by: cm`

----------------
Best Buy Employee Toolkit Interactive is a software program used nationally by Best Buy Terminal Systems. The software allows employees the ability to check multiple systems throughout the internal network. A URL Parsing vulnerability in the configuration screen could allow an attacker to execute a command shell interface and hijack certain network connections or read plain-text passwords.

-----------------
Impact: High
-----------------

Analysis:
-URL Parsing
By pressing CTRL+SHIFT within the Employee Toolkit software and clicking on the exit button, a logged in user is given access to the Toolkit's configuration screen. An area within the configuration screen allows a logged in user to enter a URL. There are no bounds checking on what is entered in the URL area and an attacker could use this to execute a local command shell or execute other programs locally stored.

-Plain-text Password Disclosure
Once an attacker has executed a local command shell, they then have access to the root directory which houses a batch file that remotely mounts the Store's central server. The batch file uses the 'net use' command to map the server's drive and holds the password for the administrator of the central server in plain text.

By combining the trickery of both the URL Parsing vulnerability and the plain-text password disclosure an attacker could execute telnet to remotely log into the central server as the administrator.

Finding the servers on the local area network is as easy as executing the 'net view' command at command shell. Another method for finding these servers is to open a page within the employee toolkit and pressing CTRL+P to bring up the printing interface. Choose to print the text to a file then click the network button. This will bring up all of the computers connected to the Best Buy network.

-----------------
Vendor Status:
-----------------

05/05/2003 - Best Buy notified of vulnerability.
06/12/2003 - Best Buy coordinates with IBM to release a fix; Patch ineffective.
06/12/2003 - Best Buy notified of patch ineffectivness, I was told vulnerability was not a serious problem.
07/27/2003 - Best Buy notified again of vulnerability and its impact.
08/14/2003 - No Response from Best Buy.
08/14/2003 - Public Disclosure.



Spotlight

Critical bug found in Cisco ASA products, attackers are scanning for affected devices

Several Cisco ASA products - appliances, firewalls, switches, routers, and security modules - have been found sporting a flaw that can ultimately lead to remote code execution by attackers.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Fri, Feb 12th
    COPYRIGHT 1998-2016 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //