University uses old version with known Vulnerabilities

We could not find out how exactly the attack happened, because none of the involved institutions have given us a statement yet. An analysis of the software however brought up some details that may give a hint.

Stellenmarkt
  1. Mitarbeiter IT Controlling (m/w/d)
    rhenag Rheinische Energie Aktiengesellschaft, Köln
  2. SAP Basis Administrator / Berechtigungsmanagement (m/w/d)
    RATIONAL Aktiengesellschaft, Landsberg am Lech
Detailsuche

In our research we were able to see the version of Ilias on the affected web page via the Google cache. According to that the site was operated with Ilias version 5.1.16. This version was released a year ago in March 2017. Since then, many security updates have been issued that apparently weren't installed.

The upload of SVG files enabled a cross-site scripting vulnerability, another cross-site scripting vulnerability was found due to a lack of filtering of form inputs. In some situations, a flaw in the delivery of e-mails could cause the delivery of system mails to the wrong user. In October 2017 a vulnerability in the handling of media files was found, though no details about the impact were published. In early February 2018, another cross site scripting vulnerability was found.

Exploiting such vulnerabilities usually requires the attacker tricking the victim into clicking on a malicious link or accessing a specific portion of a site containing attacker-controlled code. This is usually more complicated to exploit than some other classes of vulnerabilities that allow immediate code execution or the extraction and manipulation of data. But for a professional attacker it is still a realistic scenario.

Golem Akademie
  1. Ansible Fundamentals: Systemdeployment & -management: virtueller Drei-Tage-Workshop
    6.–8. Dezember 2021, Virtuell
  2. Hands-on C# Programmierung: virtueller Zwei-Tage-Workshop
    1.–2. Dezember 2021, virtuell
Weitere IT-Trainings

A severe vulnerability was fixed in the version 5.1.16 that the University had used. According to the description it allowed copying files to arbitrary places on the file system. That would probably make it relatively easy to completely take over an installation and execute code. This vulnerability was fixed in the version that was active until a few days ago, but according to previous reports the attack had started several months before it was detected in December 2017.

Administrator account with default Password "homer"

During the analysis of Ilias we found another weakness. After a fresh installation of the system a default account with administrator permissions is created. This is assigned the username "root" and the password "homer". The user is not asked to change the default password. Therefore it's possible that the default password was simply never changed.

We found no easy way to directly execute code with an administrator account, but of course it is possible that such a vector exists and we simply haven't found it.

It's also possible that the attack happened with a yet unknown vulnerability or with login data that was stolen via phishing. The Ilias system is quite extensive and has many possibilities for users to interact with it. File uploads of various media formats, a wiki, a plugin system and a lot of other features provide a large attack surface.

Approved by NATO

During our research we found a report from 2008. According to this, NATO tested the Ilias software for three days and didn't find any security flaws. Ilias can therefore be used in NATO's internal network Chronos. Also according to the report, Ilias was used by NATO to prepare soldiers for the ISAF mission in Afghanistan.

Please notice: The German version of this article can be read here.

Bitte aktivieren Sie Javascript.
Oder nutzen Sie das Golem-pur-Angebot
und lesen Golem.de
  • ohne Werbung
  • mit ausgeschaltetem Javascript
  • mit RSS-Volltext-Feed
 Government Hack: Hack on German Government via E-Learning Software Ilias
  1.  
  2. 1
  3. 2


Aktuell auf der Startseite von Golem.de
Razer Zephyr im Test
Gesichtsmaske mit Stil bringt nicht viel

Einmal Cyberpunk mit Beleuchtung bitte: Tragen wir Razers Zephyr in der U-Bahn, fallen wir auf. Allerdings ist das Produkt nicht ausgereift.
Ein Test von Oliver Nickel

Razer Zephyr im Test: Gesichtsmaske mit Stil bringt nicht viel
Artikel
  1. Energiewende: Rohstoffkosten sorgen für Umbruch auf dem Akkumarkt
    Energiewende
    Rohstoffkosten sorgen für Umbruch auf dem Akkumarkt

    Hohe Rohstoffpreise stoppen den Fall der Akkupreise. Neue Rekordpreise bei Lithium werden Akkus 2022 sogar teurer machen.
    Eine Analyse von Frank Wunderlich-Pfeiffer

  2. Zip: Ratenzahlung in Microsoft Edge empört die Community
    Zip
    Ratenzahlung in Microsoft Edge empört die Community

    Die App Zip wird seit Microsoft Edge 96 standardmäßig aktiviert. Diese bietet Ratenzahlung an, schürt aber nur Hass in der Community.

  3. Science-fiction: Bethesda zeigt mehr von Starfield
    Science-fiction
    Bethesda zeigt mehr von Starfield

    Abenteuer im Weltraum mit halbwegs glaubwürdiger Technologie soll Starfield bieten. Jetzt hat Bethesda einen neuen Trailer veröffentlicht.

Du willst dich mit Golem.de beruflich verändern oder weiterbilden?
Zum Stellenmarkt
Zur Akademie
Zum Coaching
  • Schnäppchen, Rabatte und Top-Angebote
    Die besten Deals des Tages
    Daily Deals • Last Minute Angebote bei Amazon • Crucial-RAM zu Bestpreisen (u. a. 16GB Kit DDR4-3600 73,99€) • HP 27" FHD 165Hz 199,90€ • Razer Iskur X Gaming-Stuhl 239,99€ • Adventskalender bei MM/Saturn (u. a. Surface Pro 7+ 849€) • Alternate (u. a. Adata 1TB PCIe-4.0-SSD für 129,90€) [Werbung]
    •  /