|
||
Research and retrieval of news articles by: SPECIAL NOTE TO ALL VISITORS: |
SITES STILL VULNERABLE TO BUG IN IBM SOFTWARESource: Internet NewsPosted on February 8, 2001 An unpatched security hole in online storefront software from IBM is potentially exposing scores of high-profile ecommerce sites to attacks from outsiders. The vulnerability in IBM's Net.Commerce software could enable an attacker to gain administrative access to an online store. Such ability would allow an outsider to upload and download files, issue operating system commands, and extract any information from the site's database, including customer records and credit cards. IBM is currently shipping version 5.1 of the software, which had been rebranded the WebSphere Commerce Suite, but hundreds of sites still use older releases. A quick search by InternetNews.com Wednesday turned up more than a dozen storefronts that appear vulnerable to an attack publicized Monday on the Bugtraq security mailing list by a Austrian software security consultant who uses the nickname "Rudi Carell." The vulnerable sites include those operated by a major discount shoe retailer, a leading computer manufacturer, one of the biggest purveyors of chainsaws, and two online jewelry stores. Tim Breuer, a spokesperson for IBM, confirmed Wednesday that a similar security vulnerability was identified in internal testing by IBM in October 1999 in Net.Commerce version 2 and up to version 3.1. According to Breuer, the company subsequently released a patch, and recent editions of the software do not contain the bug. "We aggressively contacted all of our customers and business partners and made them aware of this and encouraged them to use the fix. Since it was a year and a half ago and we haven't had a single customer come in and say there was an issue related to it, we're confident it was addressed at the time," said Breuer. A search of the security advisories at IBM's site did not turn up any bulletins from the company about the Net.Commerce issue. Nor could any notice of the patch be found in other leading archives of security and ecommerce software discussion lists. According to Carell, the vulnerability lies in the macro functions in the affected versions of Net.Commerce. These macros are shortcuts designed to retrieve data from the Net.Commerce database and display it as a formatted Web page. However, Carell says the macros don't do proper input validation and thus enable web surfers to enter random SQL commands into the store's database. "The more input you tolerate, the more dangerous it is passing user input to program or operating systems functions. And if you miss that, your web-based software will turn into a nightmare," said Carell. Using one of the exploits he posted, InternetNews was able to display administrator account names at several Net.Commerce sites, although separate attacks to gather the corresponding passwords and hints were unsuccessful. Elias Levy, chief technology officer for SecurityFocus.com, says input filtering errors are common to Web-based applications with database back ends. "All you would have to do is figure out the layout of the tables and columns of the database and craft the correct SQL statement to get that data back," said Levy, who noted that the Net.Commerce bug resembles the widely-publicized RDS vulnerability in Microsoft's Internet Information Server. With details of the Net.Commerce vulnerability brought to light, Levy advises Net.Commerce administrators to review their configurations and either upgrade or contact IBM for a patch.
E-Commerce Alerts are issued by Bennett Gold LLP, Chartered Professional Accountants as situations develop. Bookmark this site and check back often. Our e-mail address is: info@BennettGold.ca In accordance with United States Code, Title 17, Section 107 and Article 10 of The Berne Convention on Literary and Artistic Works, the news clippings on this web site are made available without profit for research and educational purposes. |
ALERT WebTrust Is Your Best Defense Against Privacy Breaches. Get WebTrust Working For Your Site. |