Executive Summary

Summary
Title Blackboard Transact database credentials disclosure
Informations
Name VU#204055 First vendor Publication 2010-09-01
Vendor VU-CERT Last vendor Modification 2010-09-23
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 4.6 Attack Range Local
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 3.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Vulnerability Note VU#204055

Blackboard Transact database credentials disclosure

Overview

The Blackboard Transact application contains two vulnerabilities that allow an unauthorized user to access the database credentials.

I. Description

The Blackboard Transact application (previously know as Blackboard Commerce Suite) comes with a utility called BbtsConnection_Edit.exe that is used to edit the encrypted configuration file named connection.xml. When editing connection.xml, BbtsConnection_Edit.exe decrypts all the fields except the <Password> field. If a user opens the connection.xml file in text editor and copies the data for <Password> into any other field such as <Server>, then the BbtsConnection_Edit.exe program will display the password in the other field, in this example<Server>.

An additional issue exists in that the Blackboard Transact application uses multiple script and batch (.bat) files for automated backup procedures that contain the database username and password in clear text.

II. Impact

An attacker who has access to BbtsConnection_Edit.exe and the connection.xml file, or read access to the backup scripts, can obtain the database username and password.

III. Solution

Upgrade

The vendor has acknowledged these issues and additional information is available in the Vendors Affected section of this document.

Restrict access

It may be possible to set file permissions on BbtsConnection_Edit.exe, connection.xml, and the script and batch (.bat) files used for automated backup procedures to restrict access by administrators only.

Vendor Information

VendorStatusDate NotifiedDate Updated
Blackboard Inc.Affected2010-07-022010-09-23

References

http://www.blackboard.com/Commerce-Security/Transact-Platform.aspx

Credit

Thanks to John Fisher for reporting this vulnerability.

This document was written by Michael Orlando.

Other Information

Date Public:2010-08-17
Date First Published:2010-09-01
Date Last Updated:2010-09-23
CERT Advisory: 
CVE-ID(s): 
NVD-ID(s): 
US-CERT Technical Alerts: 
Metric:3.33
Document Revision:40

Original Source

Url : http://www.kb.cert.org/vuls/id/204055

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-200 Information Exposure

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1

Open Source Vulnerability Database (OSVDB)

Id Description
67774 Blackboard Transact BbtsConnection_Edit.exe connection.xml Password Local Dis...

67772 Blackboard Transact Automated Backup Cleartext Database Credentials Local Dis...