Skip to content

Commit dc9d710

Browse files
committed
Tibco README corrected for markdown.
1 parent 91533cd commit dc9d710

File tree

1 file changed

+13
-6
lines changed

1 file changed

+13
-6
lines changed

Tibco/README.md

Lines changed: 13 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,13 @@
1-
== Introduction
1+
# Tibco password decryption exploit
2+
3+
## Introduction
24

35
During a pen-test of an internally developed application, I discovered that the engineers in question had re-used a commercial Java library for password obfuscation.
46

57
While their application was not part of a Tibco stack, nor did it use Tibco, they did make use of Tibco's "*ObfuscationEngine*". On Tibco systems, this tool is used to obfuscate (and sometimes encrypt) passwords for safe storage in configuration files.
68

79

8-
== Background ==
10+
## Background
911

1012
Tibco's documentation states that there are three modes of operation for this ObfuscationEngine tooling:
1113

@@ -26,7 +28,7 @@ and
2628
Secrets obfuscated using the Tibco fixed key can be recognized by the fact that they start with the characters #!. For example: "#!oe2FVz/rcjokKW2hIDGE7nSX1U+VKRjA".
2729

2830

29-
== Issues ==
31+
## Issues
3032

3133
The first statement does not make clear the risks that are involved, while the second statement is blatantly incorrect.
3234

@@ -48,7 +50,7 @@ By analyzing this JAR file, I recovered the fixed key. Using that I wrote a smal
4850
The code is provided here in this repository as “decrypt.java”.
4951

5052

51-
== Impact ==
53+
## Impact
5254

5355
Regardless of country, customer, network or version of Tibco, any secret that was obfuscated with Tibco's ObfuscationEngine can be decrypted using my Java tool. It does **not** require access to Tibco software or libraries.
5456

@@ -57,7 +59,7 @@ All you need are exfiltrated secret strings that start with the characters #!.
5759
This is not going to be fixed by Tibco, this is a design decision also used for backwards compatibility in their software.
5860

5961

60-
== Instructions ==
62+
## Instructions
6163

6264
Compile with:
6365

@@ -72,7 +74,7 @@ Examples of running, with secrets retrieved from websites and forums:
7274
tibco
7375

7476

75-
== Outcome ==
77+
## Outcome
7678

7779
I have shared my findings internally with my client. I have advised them to A) stop including Tibco's copyrighted classes and libraries into their own Java applications, B) replace all secrets encrypted using this method, as they should be considered compromised.
7880

@@ -89,3 +91,8 @@ The text now reads:
8991
"*The fixed key is compatible with earlier versions of TIBCO Runtime Agent but should not be treated as secure. A machine key or custom encryption key should be used whenever possible.*"
9092

9193

94+
## CVE / Vulnerability information
95+
96+
No CVE was awarded as the vendor did not recognize this as a vulnerability. This is intended functionality, which "works as designed".
97+
98+

0 commit comments

Comments
 (0)