Gregory D. Evans and LIGATT Security

Do you trust these "security experts" to secure your network?

Updated: Wed Jun 23 18:37:35 CDT 2010

Every vendor that publishes software invariably runs into the situation where their product has a vulnerability. Most web sites have a few low-risk issues, especially minor information disclosures. Some companies consider this acceptable risk, others are oblivious. When a security company offers penetration testing services, they will almost certainly deliver a vulnerability report to a client outlining these types of vulnerabilities. Because it is in their interest to show they did a good job, they frequently go overboard in describing the risks associated with a vulnerability. Other times they may come up with a technically valid, but highly improbable attack scenario to drive the point home.

One thing that frustrates security companies is dealing with clients who won't take the time to implement trivial configuration changes to close a vulnerability. This type of mitigation technique can be widely tested, pose no risk to the stability of the client's system, and they still don't do it.

But... what happens when it's a security company that won't do that? A security company who offers penetration testing should find vulnerabilities on their own site, before the 'bad guys' do. Worse, what if the security company claims to do web application testing and misses the most simple of input validation vulnerabilities on their own web site? Not a good sign for potential customers.

The following vulnerabilities, annoyances and oddities were submitted by over a dozen people. Perhaps LIGATT should look at investing in a proper penetration test since this likely represents the tip of the iceberg.

ligattsecurity.com


Cross-site Scripting From Wikipedia: "Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications that enables malicious attackers to inject client-side script into web pages viewed by other users. An exploited cross-site scripting vulnerability can be used by attackers to bypass access controls such as the same origin policy." Since the original curiosity, there have been many additional XSS vulnerabilities found in every site LIGATT runs. While this attack may seem trivial, such a vulnerability is enough to make a company fail PCI DSS Compliance. Since LIGATT has several places for customers to login, an XSS attack is especially dangerous as it can be used to steal authentication credentials from unsuspecting users.



Update:As of Aug 31, 2010, several months after being disclosed, the site is still vulnerable to this. Dec 22, 2010, another XSS is reported.
Directory Indexing From The Web Application Security Consortium: "When a web server reveals a directory's contents, the listing could contain information not intended for public viewing." This vulnerability can be remediated by changing a directive in the web server configuration file.
Open Directory Information Disclosure The result of having directory indexing enabled, this can show an attacker not only the technical details of a web server (e.g., Apache/2.2.9 (Fedora)), but show what software and version is installed (e.g., TubePress Pro 2.0.0 for WordPress). This information can be further used to research potential vulnerabilities in the site. Heavily reliance on the WordPress software and third-party plugins, both well known for their extensive history of vulnerabilities, is evident when viewing the source of some pages.
HTTP Header Information Disclosure
Cookie Insecurity
When making an HTTP request, the server returns two headers that disclose the vendor and version of not only the web server, but also shows the presence of PHP 5.2.6. The current version of PHP for that tree is 5.2.13, making this web server potentially vulnerable to dozens of vulnerabilities.

The Session ID cookie is not set with the 'secure' flag, not marked 'HTTPonly' and not set over encrypted channels. These are three ways to help protect the integrity of the session and protect the cookie information. If the cookie was intercepted, it may allow an attacker to gain access to a user's session.
Old / Test Content Present Digging around finds a web store created on their site, seemingly abandoned in favor of the current store. Too bad you can't order the "pimp shady" merchandise for $0.00, described beautifully in Lorem Ipsum. The presence of such content indicates the web server is likely not monitored as well as it should be.
Broken Functionality While perusing the 'Latest News', you may run across LIGATT rehashing something like Symantec's Riskiest Cities report. In some cases, the implementation used to borrow content from other sites results in a pile of technical gibberish.
Improper Permissions Despite having PHP developers and security auditors on staff, LIGATT's site maintains a copy of the php.ini file in the root directory, viewable via the web server. While the configuration file has a single option, it helps attackers better understand the PHP configuration and which vulnerabilities may affect the site. Further, should the config file be updated, these changes would be publicly viewable.
Phishing Page Hosting This is a very curious page to find on a security company's site. A "First Manhattan Online Banking" password renewal page, exactly like the ones used in phishing attacks. One may argue that it is leftover from a penetration test, and if so, that means LIGATT is disclosing a client they worked for. If you doubt they worked for this bank, then it really leaves serious questions as to what LIGATT is doing with this page. If they didn't put it there, who did, and when was LIGATT compromised? The broken images are amusing, but this page is a bit more believable than a second page found, likely for the same use, that only resulted in path disclosure. It should be noted that a 'First Manhattan Bank' doesn't appear to exist, the closest obvious match being First National Bank of Manhattan. This page has since been reported to PhishTank and has been verified as a phishing site.
Outdated / Vulnerable Software The WebMail program running on their site is SquirrelMail version 1.4.17-1.fc8, released around December, 2008. This version is known to contain several vulnerabilities.
Path Disclosure At random times, LIGATT's "solutions" don't seem to be available, instead, offering up the physical path of the web page instead.



untraceableemail.net


Cross-site Scripting As with LIGATT's primary web site, their untraceableemail.net domain has several XSS vulnerabilities present.
Path Disclosure Clicking on 'BoobyTrap' from their Solutions Page yields a 404, dropping the "-by-ligatt" from the URL works, and redirects you to the untraceableemail.net domain. Attempting to sign-up for an account results in an error at the top with a nice path disclosure and broken image.
SQL Injection (?)
Path Disclosure
When visiting the 'Register Sub Account' page (/ezpay/subAccntForm.php), an error message is generated due to improper use of the mysql_fetch_assoc() function. It is not clear if this is indication of potential SQL Injection, but the resulting error message contains a full system path.
Authentication Bypass This site has a login page for the Project Management section. Typing in valid pages in this directory allow you to bypass authentication and load the page. This can also be done by going directly to the /tools/ directory, or /ezpay/subAccntForm.php to add a user without logging in.
Test Content Present As seen in the screenshot above and the one to the right, test content is present on this system. In this case, it reveals e-mail addresses for 12 employees in four divisions.
Cross User
Information Disclosure
After bypassing the login screen and adding a user account via /ezpay/subAccntForm.php, the resulting screen appears to disclose information associated with the first user registered.



spoofem.com


Path Disclosure
Availability Issues
At times, LIGATT's spoofem.net seems to have issues and only offers up an error message that includes the full system path.
Insecure Configuration After installing PHPLive!, the LIGATT administrator did not follow the installation directions. As a result, sensitive administrator pages are now accessable to the world without authentication.
Cleartext Credential
Disclosure
As part of the PHPLive! setup, the profile page shows the current information for the administrator. This includes login name, cleartext password, email address and more. While we have obscured Gregory Evans' password, we will note that by most standards, it is considered a very weak password.
Improper Permissions Despite having PHP developers and security auditors on staff, LIGATT's site maintains a copy of the php.ini file in the root directory, viewable via the web server. Unlike their corporate site, this has extensive configuration details that could help attackers in crafting PHP based attacks.
Test Content
Pornography (?)
A mix of test content on a live system, and whatever "Boobycam" may be. SPOOFEM.com really pushes the link between spoofed calling and celebrity entertainment. For example, the "WHO'S MY DADDY" blog entry and associated tag cloud suggest search engine poisoning to get more hits to the site.
Customer Credential Disclosure By visiting one of the pages in the 'Flex' setup, it returns XML containing a username, password, email address and history details of a SPOOFEM customer.
Directory Indexing From The Web Application Security Consortium: "When a web server reveals a directory's contents, the listing could contain information not intended for public viewing." This vulnerability can be remediated by changing a directive in the web server configuration file.
Login Error
Information Disclosure
Using blank credentials for their ticketing system results in an error message with internal IP disclosure, account name and system path.
Outdated / Vulnerable Software The WebMail program running on their site is SquirrelMail version 1.4.17-1.fc8, released around December, 2008. This version is known to contain several vulnerabilities.
Cleartext CC Transmission When entering your personal and credit card information, SPOOFEM will transmit that information back to LIGATT in the clear. That would allow anyone able to sniff traffic between you and their site to intercept the information. This would certainly fail them on any attempt at PCI compliance.



Other errors and annoyances:

Update, 2010-06-11

Several people have sent in additional information regarding this post. The information below was submitted to Errata by Infosecmafia and anonymous.:

IP address of their "Am I hacker proof service:" 97.74.195.39. Conveniently takes you back to their main website which is hosted at GoDaddy. Probing a bit, we find:

Interesting ports on 97.74.195.39:
Not shown: 1704 filtered ports
PORT     STATE  SERVICE
20/tcp   closed ftp-data
21/tcp   open   ftp
22/tcp   open   ssh
25/tcp   open   smtp
53/tcp   open   domain
80/tcp   open   http
110/tcp  open   pop3
443/tcp  open   https
993/tcp  open   imaps
995/tcp  open   pop3s
9999/tcp open   abyss

A DNS zone transfer is available:

; <<>> DiG 9.5.1-P3 <<>> AXFR ligattsecurity.com @97.74.195.39
;; global options:  printcmd
ligattsecurity.com.     3600    IN      SOA     ns1.ligattsecurity.com.
hostmaster.ligattsecurity.com. 2009062401 3600 3600 1209600 3600
ligattsecurity.com.     3600    IN      A       10.0.0.2
ligattsecurity.com.     3600    IN      NS      ns1.ligattsecurity.com.
ligattsecurity.com.     3600    IN      NS      ns2.ligattsecurity.com.
ligattsecurity.com.     3600    IN      MX      10 mail.ligattsecurity.com.
ftp.ligattsecurity.com. 3600    IN      A       10.0.0.2
mail.ligattsecurity.com. 3600   IN      A       10.0.0.2
ns1.ligattsecurity.com. 3600    IN      A       10.0.0.2
ns2.ligattsecurity.com. 3600    IN      A       10.0.0.2
ssh.ligattsecurity.com. 3600    IN      A       10.0.0.2
www.ligattsecurity.com. 3600    IN      A       10.0.0.2
ligattsecurity.com.     3600    IN      SOA     ns1.ligattsecurity.com.
hostmaster.ligattsecurity.com. 2009062401 3600 3600 1209600 3600

There is a known vulnerability on their FTP service (vsFTPd 2.0.5). Their SSH and SSL packages (OpenSSH_5.1p1 Debian-5, OpenSSL 0.9.8g 19 Oct 2007) has potential vulnerabilities. And then their web management application with single factor open on TCP 9999.

Managing the domains of LIGATT apparently is not as easy as one would think, as evident by one of their domains lapsing.

On or around June 26, LIGATT's nationalcybersecurity.com site began redirecting all traffic to getaforexrobot.com:

GET / HTTP/1.1
Host: www.nationalcybersecurity.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.10) Gecko/20100504 Firefox/3.5.10 (.NET CLR 3.5.30729)
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 300
Proxy-Connection: keep-alive

HTTP/1.1 301 Moved Permanently
Date: Mon, 28 Jun 2010 01:47:23 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Location: http://getaforexrobot.com
Cache-Control: private
Content-Length: 0

2010-08-09 Update: The Test Manager posted a write-up of an authentication bypass issue that allows anyone to use the LocatePC service for free.


main page ATTRITION feedback