Ruby Net::HTTPS library does not validate server certificate CN

2007.10.01
Credit: Chris Clark
Risk: Low
Local: No
Remote: Yes
CWE: CWE-287


CVSS Base Score: 4.3/10
Impact Subscore: 2.9/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: None
Integrity impact: Partial
Availability impact: None

iSEC Partners Security Advisory - 2007-006-RubySSL http://www.isecpartners.com -------------------------------------------- Ruby Net::HTTPS library does not validate server certificate CN Vendor: Ruby Vendor URL: http://www.ruby-lang.org Versions affected: 1.8.5, 1.8.6, Trunk Ruby Systems Affected: All Ruby Platforms Severity: Medium - Compromise of SSL connection integrity Author: Chris Clark <cclark[at]isecpartners[dot]com> Vendor notified: Yes Public release: Yes Advisory URL: http://www.isecpartners.com/advisories/2007-006-rubyssl.txt Summary: -------- The Ruby Net::HTTP and Net::HTTPS library can be used to make HTTP or HTTPS connections to remote websites. There are several methods for performing these types of connections within the Ruby standard library but the Net::HTTP library is recommended going forward. A vulnerability results from the Net::HTTPS library failing to validate the name on the SSL certificate agains the DNS name requested by the user. By not validating the name, the library allows an attacker to present a cryptographically valid certificate with an invalid CN. Details: -------- The vulnerability is caused by the method connect within http.rb file failing to call post_connection_check after the SSL connection has been negotiated. Since the server certificates CN is not validated against the requested DNS name, the attacker can impersonate the target server in a SSL connection. The integrity and confidentiality benefits of SSL are removed by this vulnerability. Example: If the application uses the following code to connect to the ip address of https://www.citicards.com: url = "192.193.222.24" #www.citicards.com IP path = "/" http = Net::HTTP.new(url, 443) http.use_ssl = true http.ca_file = "verisign.pem" http.verify_mode = OpenSSL::SSL::VERIFY_PEER resp, data = http.get(path, nil) The connection will succeed. This is an obvious failure as the certificate presented has a CN of www.citicards.com. One caveat is that the attacker must possess a certificate signed by the CA specified in the ca_file attribute. Fix Information: ---------------- This issue has been addressed by adding the appropriate post connection check within http.rb. These patches add the enable_post_connection parameter, which if set to true, will cause the Net::HTTP library to raise an exception when the post connection check fails. The following trunk Ruby checkin contains the related changes: http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=rev&revision=13499 http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=rev&revision=13500 Ruby 1.8.5: http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=rev&revision=13502 Ruby 1.8.6: http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=rev&revision=13504 Thanks to: ---------- Rachel Engel, GOTOU Yuuzou, and Minero Aoki About iSEC Partners: -------------------- iSEC Partners is a full-service security consulting firm that provides penetration testing, secure systems development, security education and software design verification, with offices in San Francisco, Seattle, Ewa Beach, and Los Angeles. http://www.isecpartners.com info (at) isecpartners (dot) com [email concealed]


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top