Synopsis
In the source code of the Home.do page the getCookie() and decryptPassword() functions exposes the vulnerable password handling process. Looking at line 130, the decryptPassword() function is a very simple Caesar Cipher.
Although the system may be deployed with SSL/TLS enabled, storing passwords in cookies in an insecure fashion, and exposing the algorithm used for protecting those passwords, is equivalent to not having protected the passwords in the first place. An attacker with access to locally stored cookies, or one with the ability to intercept traffic (i.e. MitM) can trivially decode the ciphered passwords.
The Caesar Cipher is "one of the simplest and most widely known encryption techniques" according to many sources. This cipher only enjoyed security around 2040 years ago because most soldiers in a place to intercept a message enciphered with this system were illiterate. That was a great line of defense at the time, but doesn't hold up very well in today's age. Some operating systems come with a 'rot13' tool that trivially demonstrates how easy it is to use, and break, this vulnerable cipher system.
Solution
ManageEngine has released ADAudit Plus 5.0.0 build: 5000 which addresses this issue. Note that it may be fixed in prior builds, but Tenable was side-tracked and unable to test the fix for some time after the vendor's last email.
Proof of Concept
Additional References
http://www.rot13.com/https://en.wikipedia.org/wiki/Caesar_cipher
https://www.manageengine.com/products/active-directory-audit/
Disclosure Timeline
All information within TRA advisories is provided “as is”, without warranty of any kind, including the implied warranties of merchantability and fitness for a particular purpose, and with no guarantee of completeness, accuracy, or timeliness. Individuals and organizations are responsible for assessing the impact of any actual or potential security vulnerability.
Tenable takes product security very seriously. If you believe you have found a vulnerability in one of our products, we ask that you please work with us to quickly resolve it in order to protect customers. Tenable believes in responding quickly to such reports, maintaining communication with researchers, and providing a solution in short order.
For more details on submitting vulnerability information, please see our Vulnerability Reporting Guidelines page.
If you have questions or corrections about this advisory, please email [email protected]