<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Brute-Force Attack — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/brute-force-attack/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 09 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/brute-force-attack/feed.xml" rel="self" type="application/rss+xml"/><item><title>OpenMage LTS Weak API Session ID Vulnerability Leads to Session Hijacking</title><link>https://feed.craftedsignal.io/briefs/2024-01-openmage-session-hijacking/</link><pubDate>Tue, 09 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-openmage-session-hijacking/</guid><description>OpenMage LTS version 20.16.0 and earlier has a critical vulnerability in the XML-RPC/SOAP API session ID generation, which uses a predictable MD5 hash of time-derived inputs, allowing attackers to brute-force and hijack active API sessions for data exfiltration, order fraud, and supply chain manipulation.</description><content:encoded><![CDATA[<p>OpenMage LTS, a fork of Magento, is vulnerable to session hijacking due to its insecure method of generating API session IDs. Specifically, versions 20.16.0 and earlier generate session IDs using an MD5 hash of time-derived inputs (timestamp, microsecond, and LCG state), rather than a cryptographically secure random number generator. This vulnerability exists in the <code>Mage_Api_Model_Session.php</code> file within the <code>start()</code> method.  The lack of sufficient entropy in the session ID makes it predictable and susceptible to brute-force attacks, especially given the absence of API rate limiting. An attacker can exploit this vulnerability to gain unauthorized access to user accounts and perform malicious actions. This vulnerability affects all legacy API surfaces including XML-RPC, SOAP v1, SOAP v2, and legacy REST APIs.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker observes a victim authenticating to the <code>/api/xmlrpc/</code> endpoint, capturing the Unix timestamp of the login event via network timing or exposed logs.</li>
<li>The attacker estimates the microsecond portion of the timestamp based on observed network latency or other side-channel information.</li>
<li>The attacker reconstructs the MD5 hash format using the known timestamp and the estimated microsecond window.</li>
<li>The attacker bounds the LCG float component based on server PID ranges (if known or leaked via <code>/server-status</code>).</li>
<li>The attacker generates a candidate pool of MD5 hashes based on the reconstructed format and LCG variations.</li>
<li>The attacker sends a series of crafted HTTP POST requests to the <code>/api/xmlrpc/</code> endpoint, each containing a different candidate session ID within the <code>&lt;methodCall&gt;&lt;params&gt;&lt;param&gt;&lt;value&gt;&lt;string&gt;{CANDIDATE_SESSION_ID}&lt;/string&gt;&lt;/value&gt;&lt;/param&gt;&lt;/params&gt;&lt;/methodCall&gt;</code> XML structure.</li>
<li>The attacker monitors the HTTP responses for a non-fault response (HTTP 200 containing data), indicating a successful session hijack.</li>
<li>Upon successful hijack, the attacker uses the valid session ID to access privileged API endpoints, such as those for managing product catalogs, customer data, or orders, to perform malicious actions such as data exfiltration, order fraud, or inventory manipulation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to hijack active API sessions, granting them full control over the compromised account.  This can lead to data exfiltration of customer PII, order history, and payment methods. Attackers can also manipulate orders by creating, canceling, or changing shipping addresses. Further, they can modify prices, inject malicious products, or zero out stock, leading to significant financial and operational damage. This vulnerability affects all legacy API protocols, including XML-RPC, SOAP v1, SOAP v2, and REST APIs.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the vendor-supplied patch to replace the time-derived token with a cryptographically secure random value, as described in the advisory by updating <code>app/code/core/Mage/Api/Model/Session.php</code> file.</li>
<li>Implement rate limiting on API endpoints like <code>/api/xmlrpc/</code> to prevent high-speed online brute-force attacks.</li>
<li>Monitor web server logs for unusual POST requests to the <code>/api/xmlrpc/</code>, <code>/api/soap/</code>, <code>/api/v2_soap/</code>, and <code>/api/rest/</code> endpoints using the Sigma rule provided to detect potential session hijacking attempts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>session hijacking</category><category>API vulnerability</category><category>brute-force attack</category></item></channel></rss>