PeopleSoft Application Messaging Gateway XML External Entities (XXE) attack can be used to read files

peoplesoft-xxe-read-files (10520) The risk level is classified as MediumMedium Risk

Description:

PeopleSoft PeopleTools 8 is vulnerable to an XML External Entities (XXE) attack that can be used to read local files. This is caused by a vulnerability in the PeopleSoft Application Messaging Gateway, which allows for communication and synchronization of data between different PeopleSoft installations.

The Application Messaging Gateway is administered using the Gateway Administration servlet, which is accessible to everyone by default. The servlet can be used to add handlers, to which data sent to the gateway is then delivered. The SimpleFileHandler is used to push data out of the PeopleSoft system. If a remote attacker submits malicious XML data containing XML External Entities (XXE) to the SimpleFileHandler using an HTTP POST request, the attacker could cause the system to return portions of arbitrary files, which may contain server configuration information or other confidential information.


Consequences:

Obtain Information

Remedy:

For vulnerability detection:

Enable the following checks in the ISS Protection Platform:
PeoplesoftXxeReadFiles

For Virtual Patch:

Enable the following checks in the ISS Protection Platform:
HTTP_POST_PeopleSoft_XXE

Block or restrict the following in the ISS Protection Platform as appropriate to the environment:
Port configured on install

For Manual Protection:

Upgrade to the latest version of PeopleTools (8.19 or later), when it becomes available from PeopleSoft Customer Connection Web site. See References.

As a workaround,Restrict access to the vulnerable servlets.

  1. In the weblogic.properties file (the main configuration file for WebLogic), change the following line:
    weblogic.allow.execute.weblogic.servlet.servlets/gateway.administration=everyone

    to:

    weblogic.allow.execute.weblogic.servlet.servlets/gateway.administration=system
  2. Similarly:
    weblogic.allow.execute.weblogic.servlet.servlets/gateway=everyone

    must be changed to:

    weblogic.allow.execute.weblogic.servlet.servlets/gateway=system

These changes will password-restrict access to the vulnerable servlets.

References:

Platforms Affected:

  • Oracle PeopleSoft PeopleTools 8.14
  • Oracle PeopleSoft PeopleTools 8.15
  • Oracle PeopleSoft PeopleTools 8.16
  • Oracle PeopleSoft PeopleTools 8.17
  • Oracle PeopleSoft PeopleTools 8.18

Reported:

Jan 20, 2003

The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.

For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this

Return to the main page