How to Harpon Big Blue!
A story about creating backdoors in IBM’s Websphere Portal! This is a feature I’m told…
How this all started…
Last year while working on a Synack target I notice a website with a long string, like below.
I recognized that this was a serialized string, and after a bit of poking around, found out it was an IBM Websphere Portal, but that’s about all I knew at the time. So now you know as much as I did when I started. WebSphere Portal is an enterprise software used to build and manage web portals. Now you are all caught up, and before we do the deep dive, this write-up will go over how I found this and how to exploit it. Creating a backdoor account in a WebSphere Portal website is just the start of the attack. This can be used for all sorts of things, like finding secret URLs, gathering user data, impersonation, and soo much more. WebSphere Portal is used by government, medical, and shipping service websites.
Let us begin.
I always start by looking at the HTML to see what I’m up against. I found something in the HTML I found very interesting.
After reading how this works, I found you can use the URL below to download the page collection.
The URL above has some parts worth mentioning to understand how this all works.
WPS is the main URL, then we have the unauthenticated contenthandler to display or download things, we have MAC which is the friendly path of the main site, this can be different per web site, and we specify the URI which consists of directory ra and the oid or object ID which in this case is collection. There are common directories like nm, ac, um, and ra.
The below list are packages that define content elements of the portal and its surrounding infrastructure.
- editLayout : “ibm.portal.Content”
- MainPage: “wps.content.root”
- editPageProperties : “ibm.portal.Page Properties”,
- assignRoles : “ibm.portal.Resource Permissions”,
- editAppProperties: “ibm.portal.Template and Application Properties”,
- editAppLayout: “ibm.portal.Template and Application Layout”,
- assignAppRoles: “ibm.portal.Application Roles”,
- assignAppMembers: “ibm.portal.Application Membership”,
- showAppPolicyStatus: “ibm.portal.Policy Status”
- hiddenPages: “ibm.portal.HiddenPages”
You can use the above list to construct a URL to find more about a site by constructing the URL, like below.
The list of packages can change per site, but there are a few that are common like wps.content.root, and ibm.portal.HiddenPages.
I found I could use the contenthandler to download pages using the above list that reveals hidden parts of the site, users, permissions, and memberships that should not be accessible to unauthenticated users. Below are just a few examples.
Downloading a list of users.
Or what access level those users have.
You may run into restricted parts of the site, so I should mention that Websphere has authenticated and unauthenticated parts of their site like below.
contenthandler = Unauthenticated
mycontenthandler = Authenticated
portal = Unauthenticated
myportal = Authenticated
The first issue here is you can use the unauthenticated content handler to download parts of the site that can divulge information that should not be accessible to unauthenticated users. This is a feature.
Now we want to download the hidden pages that will expose URLs that allow access to the backend.
The URL for downloading hidden pages.
Once you download the ibm.portal.HiddenPages, you can then find paths like the friendly path.
Once you use the URL above you will get redirected to the Friendly path. I found that if you make it to the friendly path you can then make it to the sign-up page. This is a feature.
Now you can sign up a user. You are probably wondering how this is possible? Good question, if we look at a default install of Websphere Portal.
I found that the site defaults to allow anonymous portal users not only access to the sign-up page but allows for the ability to create backend users, issue number two.
Once you put in basic information and click OK you may get two different messages.
The first message is a Congratulations! message. You did it!
The second message you could get could be an error message like below.
Both messages mean you created a user on the backend. On some websites, the login is blocked or you get redirected to the website's main login page. Keep in mind, you create a backend user that wasn’t registered for the main site's content. I have experienced that a user of the main site was created and I was able to access restricted content due to the lack of registration but normally the user you created is just for administrating the site.
The next question is if the login redirects or is blocked how do you log in with the user you just created? Great question!
I found that unauthenticated or anonymous users have access to what is called the service-document. This is a list of links to documents and resources. This is a feature.
This then gives you URLs that in some cases require authentication. The kind of authentication being used is basic authentication. This is where we can use the basic authentication to enter the credentials made earlier like going to a similar URL like below.
https://example.com/wps/mycontenthandler/!ut/p/dav/fs-type1/users/anonymous portal user
This will prompt you for credentials.
You can also use this to brute force administration credentials as well, which then would allow you to be an administrator of the site, issue number three. The default administrator is wpsadmin with password wpsadmin. This is a feature.
You may get redirected and automatically log in and, in some cases, you may see a page that is displayed that shows some information that is not particularly interesting about anonymous users. Now that you are logged in with your new account, browse to the below URL which is the sign-up page URL and you will get redirected to the Administration portion of the site.
There you go! You created a backdoor account. This account will have different permissions depending on how the site is configured. You may be able to delete content, search for other users, discover content, view the site map, create content used to deliver XSS attacks, the world is your oyster. There may be a WAF stopping some attacks but the WAF will not stop you from creating, editing, and gathering data.
Once you have access you can also get to the IBM Web Content Manager which IBM says accelerates the creation, maintenance, and delivery of content across intranet, extranet, Internet, and portal sites and is an administration part of WebSphere. Below are common tools that can aid in clearing your tracks or deleting all content on the site. Permissions on what you can do vary.
Managing workflows by using the workflow checker tool:
Clearing version history:
The export cache settings task:
Unlock Library Module:
Reset EventLog Module
Large Resource Finder Module
I would like to also mention that authenticated users of a website can access these parts of the site. You may configure a user on the main site and they may have excessive permissions on the backend or are able to elevate their permissions once they are logged in or create their own backdoor account that is not monitored.
Last year I reported this to IBM in hopes of a resolution. Almost a year later their fix is to put a WAF in front of the sign-up page and not fix the fact that anonymous users can create accounts. I have been able to bypass similar WAF fixes using other methods that I will keep to myself for now. So the fix is to fire up your WAF, block the sign-up page, and good luck. I have created a Nuceli script in order to easily find these, here. I’m working on making this into an RCE, SSRF, and a few other attacks that I will write about later this year. Now go out and find these! If I can find them, so can you, don’t get discouraged! I hope you enjoyed reading.