Информационная безопасность
[RU] switch to English

Дополнительная информация

  Уязвимости безопасности в различных приложениях под iOS / Android

  Re: CVE-2015-5204: HTTP header injection vulnerability in Apache Cordova File Transfer Plugin for Android

  Photos in Wifi v1.0.1 iOS - Arbitrary File Upload Vulnerability

  My.WiFi USB Drive v1.0 iOS - File Include Vulnerability

  WiFi Drive CR v1.0 iOS - Persistent Filename Dir List Vulnerability

From:David Coomber <davidcoomber.infosec_(at)_gmail.com>
Date:1 июня 2015 г.
Subject:Thycotic Password Manager Secret Server iOS Application - MITM SSL Certificate Vulnerability

Thycotic Password Manager Secret Server iOS Application - MITM SSL
Certificate Vulnerability

"With the Password Manager Secret Server app, you can access passwords
for an EXISTING on-premise Secret Server or Secret Server Online

"This password app combines enterprise-level security with home-user
simplicity, making it a convenient choice for both IT professionals
AND home users."

"Count on Extreme Security:
Your passwords are safely stored on a secure server-not on your phone.
You get top-level AES 256 bit encryption.
You get a personal pin code lock for an additional layer of security.
A built-in password generator creates strong, unique passwords.
Your data is backed by a leading enterprise password management platform."

"Safe Storage for:
Enterprise-level or personal passwords.
Bank account and tax numbers.
ATM Pins.
Social security numbers.
Credit card numbers.
Combination lock numbers"


The Thycotic Password Manager Secret Server iOS application does not
validate the SSL certificate it receives when connecting to a secure

An attacker could perform a man in the middle attack by presenting a
bogus SSL certificate which the application will accept silently.
Usernames, passwords and sensitive information could be captured by an
attacker without the user's knowledge.

February 1, 2015 - Notified Thycotic via [email protected], e-mail bounced
February 1, 2015 - Resent to [email protected] & [email protected],
e-mail to [email protected] bounced
February 2, 2015 - Thycotic confirmed the vulnerability and advised
that an update to resolve the issue would be released by the end of
the week
February 12, 2015 - Thycotic advised that the update will be released shortly
February 24, 2015 - Thycotic advised that the update has been pushed
out for another month or two
March 21, 2015 - Thycotic advised that the update has been provided to
Apple for their verification
May 26, 2015 - Thycotic released the Thycotic PAM iOS application
which they state is a replacement for the Thycotic Secret Server iOS

Thycotic has chosen to release a new application instead of updating
the existing Secret Server application. If you use the Secret Server
iOS application, you'll likely want to log in to your Secret Server
instance or https://secretserveronline.com with a browser, change your
password(s) and decide if you want to use the new application.


О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород