This is a post about an old vulnerability that I finally found the time to blog about. It dates back to 2014, but from a technical point of view it is nevertheless interesting: An XML parser that tries to fix structural errors in a document caused a DoS problem.
All previous posts of this series focused on XSS. This time, we present a vulnerability which is connected another Cloud Management Platform: OpenNebula. This Infrastructure-as-a-Service platform started as a research project in 2005. It is used by information technology companies like IBM, Dell and Akamai as well as academic institutions and the European Space Administrations (ESA). By relying on standard Linux tools as far as possible, OpenNebula reaches a high level of customizability and flexibility in hypervisors, storage systems, and network infrastructures. OpenNebula is distributed using the Apache-2 license.
OpenNebula offers a broad variety of interfaces to control a cloud. This post focuses on Sunstone, OpenNebula's web interface (see Figure 1).
Before OpenNebula 4.6.2, Sunstone had no Cross-Site Request Forgery (CSRF) protection. This is a severe problem. Consider an attacker who lures a victim into clicking on a malicious link while being logged in at a private cloud. This enables the attacker to send arbitrary requests to the private cloud through the victims browser. However, we could find other bugs in OpenNebula that allowed us to perform much more sophisticated attacks.
OpenNebula saves the incorrectly generated XML document in a database. The next time the OpenNebula core retrieves information about that particular VM from the database the XML parser is mixed up and runs into an error because it only expects a string as name, not an XML tree. As a result, Sunstone cannot be used to control the VM anymore. The Denial-of-Service attack can only be reverted from the command line interface of OpenNebula.
This bug can be triggered by a CSRF-attack, which means that it is a valid attack against a private cloud: By luring a victim onto a maliciously crafted website while logged in into Sunstone, an attacker can make all the victim's VMs uncontrollable via Sunstone. A video of the attack can be seen here:
This bug has been fixed in OpenNebula 4.6.2.
This result is a collaborative work together with Mario Heiderich. It has been published at ACM CCSW 2015. The paper can be found here.
All previous posts of this series focused on XSS. This time, we present a vulnerability which is connected another Cloud Management Platform: OpenNebula. This Infrastructure-as-a-Service platform started as a research project in 2005. It is used by information technology companies like IBM, Dell and Akamai as well as academic institutions and the European Space Administrations (ESA). By relying on standard Linux tools as far as possible, OpenNebula reaches a high level of customizability and flexibility in hypervisors, storage systems, and network infrastructures. OpenNebula is distributed using the Apache-2 license.
OpenNebula offers a broad variety of interfaces to control a cloud. This post focuses on Sunstone, OpenNebula's web interface (see Figure 1).
![]() |
Figure 1: OpenNebula's Sunstone Interface displaying a VM's control interface |
Before OpenNebula 4.6.2, Sunstone had no Cross-Site Request Forgery (CSRF) protection. This is a severe problem. Consider an attacker who lures a victim into clicking on a malicious link while being logged in at a private cloud. This enables the attacker to send arbitrary requests to the private cloud through the victims browser. However, we could find other bugs in OpenNebula that allowed us to perform much more sophisticated attacks.
Denial-of-Service on OpenNebula-VM
At its backend, OpenNebula manages VMs with XML documents. A sample for such an XML document looks like this:<VM>OpenNebula 4.6.1 contains a bug in the sanitization of input for these XML documents: Whenever a VM's name contains an opening XML tag (but no corresponding closing one), an XML generator at the backend automatically inserts the corresponding closing tag to ensure well-formedness of the resulting document. However, the generator outputs an XML document that does not comply with the XML schema OpenNebula expects. The listing below shows the structure that is created after renaming the VM to 'My <x> VM':
<ID>0</ID>
<NAME>My VM</NAME>
<PERMISSIONS>...</PERMISSIONS>
<MEMORY>512</MEMORY>
<CPU>1</CPU>
...
</VM>
<VM>The generator closes the <x> tag, but not the <NAME> tag. At the end of the document, the generator closes all opened tags including <NAME>.
<ID>0</ID>
<NAME>My <x> VM</x>
<PERMISSIONS>...</PERMISSIONS>
<MEMORY>512</MEMORY>
<CPU>1</CPU>
...
</NAME>
</VM>
OpenNebula saves the incorrectly generated XML document in a database. The next time the OpenNebula core retrieves information about that particular VM from the database the XML parser is mixed up and runs into an error because it only expects a string as name, not an XML tree. As a result, Sunstone cannot be used to control the VM anymore. The Denial-of-Service attack can only be reverted from the command line interface of OpenNebula.
This bug can be triggered by a CSRF-attack, which means that it is a valid attack against a private cloud: By luring a victim onto a maliciously crafted website while logged in into Sunstone, an attacker can make all the victim's VMs uncontrollable via Sunstone. A video of the attack can be seen here:
This bug has been fixed in OpenNebula 4.6.2.
This result is a collaborative work together with Mario Heiderich. It has been published at ACM CCSW 2015. The paper can be found here.
Read more
- Hacker Tool Kit
- Nsa Hack Tools
- Hacker Tools Online
- New Hack Tools
- Best Pentesting Tools 2018
- Best Pentesting Tools 2018
- Android Hack Tools Github
- Hack Apps
- Tools Used For Hacking
- Ethical Hacker Tools
- Hack Website Online Tool
- Hacking Tools 2019
- New Hack Tools
- Hacking Tools Pc
- Pentest Tools Subdomain
- New Hacker Tools
- Hacker Tools For Ios
- Hack Tools For Games
- Hacker Tools For Windows
- Pentest Tools Windows
- Top Pentest Tools
- Hack Tools
- Hacking Tools For Windows
- Hacker Tools For Mac
- How To Hack
- Best Pentesting Tools 2018
- Hacker Tools Free
- Hacking Tools And Software
- Tools 4 Hack
- Usb Pentest Tools
- Hacking Tools Mac
- Free Pentest Tools For Windows
- Hacker Tools
- Pentest Tools Free
- Hacker Tools For Pc
- Hacker Tools For Pc
- Beginner Hacker Tools
- Ethical Hacker Tools
- Hack Tools For Pc
- Android Hack Tools Github
- Pentest Tools For Android
- Pentest Tools Website Vulnerability
- How To Make Hacking Tools
- Easy Hack Tools
- Hacking Tools Online
- Pentest Tools Android
- Hacker Tools Apk Download
- Best Pentesting Tools 2018
- How To Install Pentest Tools In Ubuntu
- Hacker Techniques Tools And Incident Handling
- New Hacker Tools
- Hackrf Tools
- Hacking Tools Download
- Pentest Tools Subdomain
- Black Hat Hacker Tools
- Hacker Tools Apk
- Hack Tools
- Hacking Tools For Windows 7
- Hacks And Tools
- Pentest Tools Open Source
- Physical Pentest Tools
- Hack Rom Tools
- Ethical Hacker Tools
- Hacker Tools Github
- Termux Hacking Tools 2019
- Pentest Tools Online
- Pentest Tools Alternative
- Pentest Tools Tcp Port Scanner
- Hacking Tools Software
- Pentest Tools Subdomain
- Hacker Tools Software
- Best Hacking Tools 2020
- Hacking Tools Free Download
- Pentest Tools Open Source
- Free Pentest Tools For Windows
- What Is Hacking Tools
- Hacker Tools Apk Download
- Hackrf Tools
- Bluetooth Hacking Tools Kali
- Pentest Tools Nmap
- Hacker Security Tools
- Tools For Hacker
- Pentest Tools Android
- Physical Pentest Tools
- Pentest Tools Apk
- Hacking Tools For Kali Linux
- Hak5 Tools
- Hacking Tools 2019
- Hack Tools For Ubuntu
- Nsa Hacker Tools
- Beginner Hacker Tools
- Pentest Tools Nmap
- Ethical Hacker Tools
- Hacking Tools Free Download
- Hacker
- Hack Website Online Tool
- Hacker Tools For Windows
- Pentest Tools Kali Linux
- Hack Tools For Ubuntu
- Hacker Tools Software
- Pentest Tools Framework
- Pentest Tools For Android
- Install Pentest Tools Ubuntu
- Hacker Tools Windows
- Hack Tools For Games
- Blackhat Hacker Tools
- Github Hacking Tools
- Hacker Tools
- How To Hack
- Hacks And Tools
No comments:
Post a Comment