Overview
HR Systems Strategies info:HR HRIS 7.9 and possibly earlier versions allow read access to a weakly obfuscated database password. This password is shared by all clients within an info:HR site. A local attacker can decipher the password and gain complete control of the database and application, including access to sensitive personally identifiable information (PII).
Description
info:HR is "...a robust, general-purpose Human Resources Information System (HRIS)" that runs on the Microsoft Windows platform and uses Microsoft SQL Server. info:HR stores database credentials in a registry key that allows read access to any local user. The database password is weakly obfuscated with a static key and can be easily deciphered. Aspects of this vulnerability include CWE-314: Cleartext Storage in the Registry, CWE-327: Use of a Broken or Risky Cryptographic Algorithm. |
Impact
A local attacker can read and decipher the SQL database password, granting the attacker complete control over the database. The attacker can also read and decipher info:HR application passwords to gain administrative privileges in the application. info:HR systems are likely to contain sensitive personally identifiable information (PII). |
Solution
Apply an Update |
Restrict access to the USERPW registry key |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 4.1 | AV:L/AC:M/Au:S/C:P/I:P/A:P |
Temporal | 3.7 | E:F/RL:W/RC:C |
Environmental | 1.1 | CDP:L/TD:L/CR:ND/IR:ND/AR:ND |
References
Acknowledgements
Thanks to Chris Mayhew from Run Straight Consulting Ltd for reporting this vulnerability.
This document was written by Adam Rauf.
Other Information
CVE IDs: | CVE-2013-5208 |
Date Public: | 2013-10-14 |
Date First Published: | 2013-10-15 |
Date Last Updated: | 2013-10-16 13:56 UTC |
Document Revision: | 44 |