Read Bennett Gold LLP's privacy policies and practices regarding this web site.
LINK TO: Bennett Gold LLP's Privacy Policies and Practices. E-CommerceALERT.com is part of the Bennett Gold LLP web site network.
LINK TO: Bennett Gold LLP, Chartered Accountants, home page.
LINK TO: E-CommerceALERT.com Home Page.
CLICK to GO BACK to Main Page.

Research and retrieval of news articles by Bennett Gold LLP, Chartered Accountants


SPECIAL NOTE TO ALL VISITORS:
Effective December 31, 2012, articles are no longer being updated on this web site.
The site is now maintained as an historical archive, covering articles from the period 1999 to 2012.


SITES STILL VULNERABLE TO BUG IN IBM SOFTWARE

Source: Internet News

Posted on February 8, 2001

      An unpatched security hole in online storefront software from IBM is potentially exposing scores of high-profile ecommerce sites to attacks from outsiders.

      The vulnerability in IBM's Net.Commerce software could enable an attacker to gain administrative access to an online store. Such ability would allow an outsider to upload and download files, issue operating system commands, and extract any information from the site's database, including customer records and credit cards.

      IBM is currently shipping version 5.1 of the software, which had been rebranded the WebSphere Commerce Suite, but hundreds of sites still use older releases.

      A quick search by InternetNews.com Wednesday turned up more than a dozen storefronts that appear vulnerable to an attack publicized Monday on the Bugtraq security mailing list by a Austrian software security consultant who uses the nickname "Rudi Carell."

      The vulnerable sites include those operated by a major discount shoe retailer, a leading computer manufacturer, one of the biggest purveyors of chainsaws, and two online jewelry stores.

      Tim Breuer, a spokesperson for IBM, confirmed Wednesday that a similar security vulnerability was identified in internal testing by IBM in October 1999 in Net.Commerce version 2 and up to version 3.1. According to Breuer, the company subsequently released a patch, and recent editions of the software do not contain the bug.

      "We aggressively contacted all of our customers and business partners and made them aware of this and encouraged them to use the fix. Since it was a year and a half ago and we haven't had a single customer come in and say there was an issue related to it, we're confident it was addressed at the time," said Breuer.

      A search of the security advisories at IBM's site did not turn up any bulletins from the company about the Net.Commerce issue. Nor could any notice of the patch be found in other leading archives of security and ecommerce software discussion lists.

      According to Carell, the vulnerability lies in the macro functions in the affected versions of Net.Commerce. These macros are shortcuts designed to retrieve data from the Net.Commerce database and display it as a formatted Web page. However, Carell says the macros don't do proper input validation and thus enable web surfers to enter random SQL commands into the store's database.

      "The more input you tolerate, the more dangerous it is passing user input to program or operating systems functions. And if you miss that, your web-based software will turn into a nightmare," said Carell. Using one of the exploits he posted, InternetNews was able to display administrator account names at several Net.Commerce sites, although separate attacks to gather the corresponding passwords and hints were unsuccessful.

      Elias Levy, chief technology officer for SecurityFocus.com, says input filtering errors are common to Web-based applications with database back ends.

      "All you would have to do is figure out the layout of the tables and columns of the database and craft the correct SQL statement to get that data back," said Levy, who noted that the Net.Commerce bug resembles the widely-publicized RDS vulnerability in Microsoft's Internet Information Server.

      With details of the Net.Commerce vulnerability brought to light, Levy advises Net.Commerce administrators to review their configurations and either upgrade or contact IBM for a patch.




CLICK to GO BACK to Main Page.

E-Commerce Alerts are issued by Bennett Gold LLP, Chartered Accountants as situations develop. Bookmark this site and check back often. Our e-mail address is: info@BennettGold.ca

In accordance with United States Code, Title 17, Section 107 and Article 10 of The Berne Convention on Literary and Artistic Works, the news clippings on this web site are made available without profit for research and educational purposes.


ALERT
ARCHIVES
Final Entries
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999


LINK TO: Bennett Gold Chartered Accountants: A Licensed Provider of WebTrust Services.

WebTrust Is Your
Best Defense
Against
Privacy Breaches.

Get WebTrust
Working For
Your Site.