We value your privacy
We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies. Cookie Policy
We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.
The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ...
Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.
No cookies to display.
Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.
No cookies to display.
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.
No cookies to display.
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
No cookies to display.
Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.
No cookies to display.
On the 18th August, 2014, AppCheck reported a Directory Traversal Vulnerability in the SafeNet SAS Outlook Web Access Agent that, without requiring any user authentication, allows a remote attacker to gain access to any file located on the remote server’s local hard drives.
The SafeNet Authentication Service (SAS) Outlook Web Access Agent (formally CRYPTOCard) provides two-factor authentication for systems running on Microsoft Information Server (IIS) including Outlook Web Access (OWA) in order to increase levels of security for Microsoft enterprise customers.
Using this vulnerability it is possible to locate and retrieve files including:
• IIS Server logs and configuration files for any locally hosted website
• MS Windows configuration files
• SAS configuration files, including the Agent Encryption Key and log files
• Access any other files located on the Windows server.
From initial investigations, it appears that all versions up to and including version 1.03.20091 are vulnerable to this issue, running on all current versions of Microsoft Outlook Web Access.
When the SAS Agent for Outlook Web Access is installed, depending on how the customer chooses to configure the server, the standard OWA login form is replaced to allow the user to enter additional login information, such as a One Time Password (OTP).
When reviewing the page source, the following lines are observed at the beginning of the file:
<meta http-equiv="
" content="
" /> <meta name="
" content="
" /> <title>CRYPTOCard Authentication Form - Outlook Web Access</title> <link rel="
" href="
/owa/?Application=Exchange&GetFile=bsid.ico
" /> <link type="
" rel="
" href="
/owa/?Application=Exchange&GetFile=logon.css
" /> <link type="
" rel="
" href="
/owa/?Application=Exchange&GetFile=owafont.css
" /> <script type="
" src="
/owa/?Application=Exchange&GetFile=flogon.js
"></script> <script type="
" src="
/owa/?Application=Exchange&GetFile=cryptocard.js
"></script>
As can be seen above, the GetFile parameter is used to provide a link to the an image or javascript file.
However, the application fails to sanitise the input passed to this parameter with the result that almost any file path passed to GetFile will be loaded and returned to the attacker.
For example, the following URL will return the remote server’s c:boot.ini file:
https://url/owa/owa?Application=Exchange& GetFile=..%5C..%5C..%5C..%5C..%5C..%5Cboot.ini
Using this vulnerability it is possible to retrieve almost any file from the remote web server, including IIS web.config files (which may include database connection strings), backup SAM/SYSTEM files or any other configuration file stored on the affected server.
The vendor was notified on the 18th August 2014 and assigned the issue ID SASIL-438 to this vulnerability. They have since released a patch, SAS OWA Agent build 1.03.30109 that resolves the issue. Further details can be found via the SafeNet Support Portal.
Customers are recommended to install the latest patch as a matter of urgency.
The Common Vulnerabilities and Exposures (CVE) project has assigned the below name to this issue. This is a candidate for inclusion in the CVE list (cve.mitre.org), which standardises names for security problems.
The following CVE id has been assigned to this issue: CVE-2014-5359 – SafeNet SAS IIS Agent Security Vulnerability
No software to download or install.
Contact us or call us 0113 887 8380
AppCheck is a software security vendor based in the UK, offering a leading security scanning platform that automates the discovery of security flaws within organisations websites, applications, network and cloud infrastructure. AppCheck are authorised by the Common Vulnerabilities and Exposures (CVE) Program as a CVE Numbering Authority (CNA)