COMMAND
CourseInfo
SYSTEMS AFFECTED
Blackboard CourseInfo 4.0
PROBLEM
James Megna found following. First of all, Blackboard CourseInfo
4.0 stores a local administrator username and password in clear
text in the registry. Unless an administrator has hardened their
registry against remote access by non-administrators, an attacker
can connect to the server and obtain an administrator username
and password without much fuss.
The key is located here:
HKEY_LOCAL_MACHINE\SOFTWARE\Blackboard, Inc.\CourseInfo40
The first three values are:
DB_ConnectString /*SQL Admin username and password, also clear text*/
DefaultPassword /*Password for specified admin account*/
DefaultUser /*Admin account name*/
It doesn't get much easier than that, eh?
As part of the installation procedure, you are instructed to
create a user and configure it as an administrator. The
technician James spoke to on the phone stated that using a member
server not participating in any domain was highly recommended, but
the installation instructions do not state this.
The Blackboard, Inc. has been contacted about this and has
recommended the following solution:
The default permissions do not restrict who has remote access
to the registry. Only administrators should have remote
access to the registry. The Registry Editor supports remote
access to the Windows NT registry. To restrict network access
to the registry:
1. Add the following key to the registry:
Hive
HKEY_LOCAL_MACHINE\SYSTEM
Key
\CurrentControlSet\Control\SecurePipeServers
Value Name
\winreg
2. Select winreg, click the Security menu, and then click
Permissions.
3. Set the Administrators permission to Full Control, make
sure no other users or groups are listed, then click OK.
The security permissions (ACLs) set on this key define which
users or groups can connect to the system for remote registry
access.
So the clear text password will stay. Anyway, that brings us to
the winreg issue. James was a little confused -- he thought the
security settings for this key were fixed several service packs
ago. On the member server in question, here were the rights to
the winreg key:
BUILTIN\Account Unknown Special Access
CREATOR OWNER Full Control
Everyone Read
SYSTEM Full Control
[server name]\Administrators Full Control
On all of the member servers which were moved straight from SP1
to SP5 (this one included), the key was insecure. On member
servers that were stepped up SP1 -> SP3 -> SP5, the key was
secure. On all domain controllers, the key was secure. Some
DC's had been given SP3, and some had gone straight to 5.
On just about every workstation reviewed, the winreg key was not
secure. On a couple, the winreg key was missing entirely.
SOLUTION
This does NOT affect clients using CourseInfo 4.0 on Unix or any
client who has upgraded to Blackboard 5. The Blackboard product
development team has developed a fix that will generate the level
of security that our customers expect. The patch encrypts the
information that Blackboard stores within the System Registry.
You can have direct access to the download at
http://company.blackboard.com/Support/files/Courseinfo4hotfix.exe