This is a post about an old vulnerability that I finally found the time to blog about. It dates back to 2014, but from a technical point of view it is nevertheless interesting: An XML parser that tries to fix structural errors in a document caused a DoS problem.
All previous posts of this series focused on XSS. This time, we present a vulnerability which is connected another Cloud Management Platform: OpenNebula. This Infrastructure-as-a-Service platform started as a research project in 2005. It is used by information technology companies like IBM, Dell and Akamai as well as academic institutions and the European Space Administrations (ESA). By relying on standard Linux tools as far as possible, OpenNebula reaches a high level of customizability and flexibility in hypervisors, storage systems, and network infrastructures. OpenNebula is distributed using the Apache-2 license.
OpenNebula offers a broad variety of interfaces to control a cloud. This post focuses on Sunstone, OpenNebula's web interface (see Figure 1).
Before OpenNebula 4.6.2, Sunstone had no Cross-Site Request Forgery (CSRF) protection. This is a severe problem. Consider an attacker who lures a victim into clicking on a malicious link while being logged in at a private cloud. This enables the attacker to send arbitrary requests to the private cloud through the victims browser. However, we could find other bugs in OpenNebula that allowed us to perform much more sophisticated attacks.
OpenNebula saves the incorrectly generated XML document in a database. The next time the OpenNebula core retrieves information about that particular VM from the database the XML parser is mixed up and runs into an error because it only expects a string as name, not an XML tree. As a result, Sunstone cannot be used to control the VM anymore. The Denial-of-Service attack can only be reverted from the command line interface of OpenNebula.
This bug can be triggered by a CSRF-attack, which means that it is a valid attack against a private cloud: By luring a victim onto a maliciously crafted website while logged in into Sunstone, an attacker can make all the victim's VMs uncontrollable via Sunstone. A video of the attack can be seen here:
This bug has been fixed in OpenNebula 4.6.2.
This result is a collaborative work together with Mario Heiderich. It has been published at ACM CCSW 2015. The paper can be found here.
All previous posts of this series focused on XSS. This time, we present a vulnerability which is connected another Cloud Management Platform: OpenNebula. This Infrastructure-as-a-Service platform started as a research project in 2005. It is used by information technology companies like IBM, Dell and Akamai as well as academic institutions and the European Space Administrations (ESA). By relying on standard Linux tools as far as possible, OpenNebula reaches a high level of customizability and flexibility in hypervisors, storage systems, and network infrastructures. OpenNebula is distributed using the Apache-2 license.
OpenNebula offers a broad variety of interfaces to control a cloud. This post focuses on Sunstone, OpenNebula's web interface (see Figure 1).
![]() |
| Figure 1: OpenNebula's Sunstone Interface displaying a VM's control interface |
Before OpenNebula 4.6.2, Sunstone had no Cross-Site Request Forgery (CSRF) protection. This is a severe problem. Consider an attacker who lures a victim into clicking on a malicious link while being logged in at a private cloud. This enables the attacker to send arbitrary requests to the private cloud through the victims browser. However, we could find other bugs in OpenNebula that allowed us to perform much more sophisticated attacks.
Denial-of-Service on OpenNebula-VM
At its backend, OpenNebula manages VMs with XML documents. A sample for such an XML document looks like this:<VM>OpenNebula 4.6.1 contains a bug in the sanitization of input for these XML documents: Whenever a VM's name contains an opening XML tag (but no corresponding closing one), an XML generator at the backend automatically inserts the corresponding closing tag to ensure well-formedness of the resulting document. However, the generator outputs an XML document that does not comply with the XML schema OpenNebula expects. The listing below shows the structure that is created after renaming the VM to 'My <x> VM':
<ID>0</ID>
<NAME>My VM</NAME>
<PERMISSIONS>...</PERMISSIONS>
<MEMORY>512</MEMORY>
<CPU>1</CPU>
...
</VM>
<VM>The generator closes the <x> tag, but not the <NAME> tag. At the end of the document, the generator closes all opened tags including <NAME>.
<ID>0</ID>
<NAME>My <x> VM</x>
<PERMISSIONS>...</PERMISSIONS>
<MEMORY>512</MEMORY>
<CPU>1</CPU>
...
</NAME>
</VM>
OpenNebula saves the incorrectly generated XML document in a database. The next time the OpenNebula core retrieves information about that particular VM from the database the XML parser is mixed up and runs into an error because it only expects a string as name, not an XML tree. As a result, Sunstone cannot be used to control the VM anymore. The Denial-of-Service attack can only be reverted from the command line interface of OpenNebula.
This bug can be triggered by a CSRF-attack, which means that it is a valid attack against a private cloud: By luring a victim onto a maliciously crafted website while logged in into Sunstone, an attacker can make all the victim's VMs uncontrollable via Sunstone. A video of the attack can be seen here:
This bug has been fixed in OpenNebula 4.6.2.
This result is a collaborative work together with Mario Heiderich. It has been published at ACM CCSW 2015. The paper can be found here.
Read more
- Hacker Security Tools
- Beginner Hacker Tools
- Nsa Hack Tools Download
- Easy Hack Tools
- Hacker Tools Apk
- Hacker Tools 2019
- Termux Hacking Tools 2019
- Hacking Tools For Windows Free Download
- Hacking Tools Software
- Github Hacking Tools
- Pentest Tools Subdomain
- Nsa Hack Tools Download
- Hacker
- Hak5 Tools
- Hacking Tools For Kali Linux
- Pentest Tools Framework
- Hacking Tools For Kali Linux
- Hacking Tools Free Download
- Hacker Tools Online
- Hacking Tools For Beginners
- Hacker Search Tools
- How To Hack
- Install Pentest Tools Ubuntu
- Hacker Tools For Mac
- Pentest Tools For Mac
- Hacking Tools Mac
- Pentest Tools Nmap
- Pentest Tools Alternative
- Game Hacking
- Pentest Tools For Mac
- Hacker Tools 2019
- Hacking Tools For Windows 7
- Nsa Hack Tools
- Pentest Tools Android
- Tools For Hacker
- Hacker Tools Software
- Install Pentest Tools Ubuntu
- Hacking Tools Pc
- Physical Pentest Tools
- Hacking Tools Download
- Hack Tools Mac
- Hacker Tools Windows
- Hacker Tools Software
- Hacking Tools Free Download
- Pentest Tools Free
- Termux Hacking Tools 2019
- Hacking Tools For Windows 7
- Hacking Apps
- World No 1 Hacker Software
- Pentest Tools Tcp Port Scanner
- Hacking Tools Software
- Hack Tools
- Top Pentest Tools
- Hacker Search Tools
- Pentest Box Tools Download
- Best Hacking Tools 2019
- Pentest Tools For Mac
- Hack Tools For Pc
- Hacker Tools Apk
- Hacking Tools 2020
- Termux Hacking Tools 2019
- Easy Hack Tools
- Pentest Automation Tools
- Pentest Tools For Mac
- Pentest Reporting Tools
- Hack Tools 2019
- Tools For Hacker
- Nsa Hack Tools
- Hacker Tools Online
- Hacker Tools Hardware
- Hack Tools For Windows
- Hacking Tools Github
- Tools Used For Hacking
- Hack Tools
- Free Pentest Tools For Windows
- Hackrf Tools
- Hacker Tool Kit
- Best Pentesting Tools 2018
- Hack And Tools
- Nsa Hack Tools
- Hacking Tools Mac
- Hack Tools 2019
- Computer Hacker
- Hacker Security Tools
- Hacker Tools Hardware
- Black Hat Hacker Tools
- Pentest Tools Tcp Port Scanner
- Tools 4 Hack
- Best Pentesting Tools 2018
- Hacker Security Tools
- Nsa Hacker Tools
- Pentest Tools For Mac
- Hacking Tools For Windows 7
- Hacker Tools 2020
- Pentest Tools Tcp Port Scanner
- Github Hacking Tools
- Pentest Tools Port Scanner
- Hacking Tools For Mac
- Pentest Tools Nmap
- Hack Apps
- Hacking Tools For Windows 7
- Pentest Tools Tcp Port Scanner
- Pentest Tools For Android
- Usb Pentest Tools
- Hacker Tools Windows
- Easy Hack Tools
- Pentest Tools Alternative
- Best Hacking Tools 2019
- Pentest Tools Free
- Hacking Apps
- Pentest Tools Alternative
- Pentest Tools Linux
- Hacking Tools Download
- Pentest Box Tools Download
- Hacking Tools Online
- Hacker Security Tools
- Pentest Recon Tools
- Github Hacking Tools
- Hacker Tools Hardware
- Hacking Tools For Windows 7
- Pentest Tools Nmap
- Hack Tool Apk No Root
- Top Pentest Tools
- Android Hack Tools Github
- Physical Pentest Tools
- Hacker Tools Free Download
- Hacker
- Pentest Tools Port Scanner
- Hack Rom Tools
- Hacking Tools For Windows Free Download
- Hacking Tools For Games
- Hacking Tools For Kali Linux
- Pentest Tools Windows
- Pentest Tools For Android
- How To Make Hacking Tools
- Hacker Search Tools
- Hacker Tools For Windows
- Hack Tools Github
- Hack Tools Mac
- Hacking Tools For Mac
- Hacking Tools Windows 10
- Hacker Tools Online
- Hacking App
- Hacking Tools Kit
- Hacking Tools Windows
- Hackrf Tools
- Android Hack Tools Github
- Nsa Hacker Tools

No hay comentarios:
Publicar un comentario