Skip to content

Atmcalpine/CYBR8420-project

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

27 Commits
 
 

Repository files navigation

CYBR8420-project

Project Team Name: Channel Four News Team

  • Ryan Thompson - Team Lead
  • Joseph Diedrichsen - Technical Analyst
  • Kendra Herrmann - Scribe/Documentation
  • Corey Mekelburg - Reviewer/QA
  • Adam Mcalpine - Project Manager
  • Brevin Wagner - Technical Analyst

Project: IT Flow

Operational Environment: MSPs are widely used by small to medium sized businesses. Small to medium sized businesses become easy targets for low-risk-low-reward attacks. MSPs, however, are a single point of attack for an adversary to takeover many of these SMBs in one fell swoop. ITFlow will need to operate on an externally or internally available webpage to allow an MSP to have access to their client information. Wherever this software is hosted, it will be a likely point for attackers to converge. ITFlow must work under load to assist in securing client passwords and data while being available to field workers and office employees.

Diagram of Software System

Threats Percieved by Users:

  • Availability
  • Unauthorized Access

List of Security Features:

  • Account Logins
  • Role-based access control
  • Password Encryption (AES)

Motivations: MSP software is vital to hundreds of small to medium sized companies in order to help them manage a varied client base that contains a myriad of hardware, software, and policies. ITFlow is a software that aims to compile company passwords, documentation, and financing information all in one portal to make MSP management more accessible. This kind of software is of vital importance to an MSP and is one of their most targeted assets by threat actors. In addition to the software being a target and source of risk for an MSP, MSPs themselves are a watering hole for attackers and adversaries since they hold the "keys to the kingdom" of many other targets. If an MSP is compromised, it can be assumed that each of their clients will be compromised, as well. Unfortunately, not every MSP is able afford security-rich software such as ITGlue to help them maintain or improve their security posture. ITFlow is an open-source solution for smaller, growing businesses to assist them in managing and securing their clients. Our team memeber, Corey Mekelburg, works at an MSP professionally and has a good understanding of how they work and what kind of security they need. We hope this will be an excellant contribution to Quality Assurance of the open source project.

Security

Open Source Project Description ITFlow is a software that consolidates common MSP needs into one system; including IT Documentation, ticketing, and billing. ITFlow is self-hosted and includes the ability to be accessed via a web browser. Currently, ITFLow is in Beta and has had 13 contributors to help build the project out in PHP, CSS, and JavaScript. Edits have been committed to GitHub for this project within the last week (week of 9-8-2023). Documentation for ITFlow can be found on it's public GitHub, referenced above.

Licensing and Contributor Agreements: ITFlow is distributed "as is" under the GPL License, WITHOUT WARRANTY OF ANY KIND.

Security History: This open-source project has a robust reporting feature that will make it easy to notify the owners that there is a security incident.

ITFlow has had two separate security advisories that the public is allowed to see. March 5, 2023: Persistent XSS

Impact: ITFlow (Beta commits prior to 75da31d) is affected by persistent XSS vulnerabilities. An authenticated application user could execute arbitrary web scripts or HTML in the browser context of other application users by injecting a crafted payload.

May 12, 2023: Authenticated users can craft a POST request to delete any file on the webserver

Impact:

  • Loss of availability
  • Catastrophic consequences if the webserver administrator is lazy and has www-data in the sudoers file
  • https://demo.itflow.org/ could potentially be taken down along with any other websites in the web directory
  • Security breach in division of account roles (for example, the Expenses page and expenses-related functions should not be available to technicians)

Reflection: The main point of contention amongst our team was finding a scheduled time to work on the project. We have a diverse background of students working on this project - parents, full-time employees, coaches, and hobbyists. This diversity provides for an enriching experience, however, it also required more effort to be put into the planning phase of our project. It should be a testament to our teamwork that we were able to successfully find a timeslot for us to work together in a continued fashion. It is to be expected that scheduling may become an issue again in the future, as plans change, but we as a group have decided that we will need to be lenient and flexible in order to reach our deadlines.

Proposal Check List

  • A link to your team's public GitHub repository that shows your internal project task assignments and collaborations to finish this task.
  • Name of an open-source software project your team has chosen to work on. From here on, it will be referred to as “software”.
  • Describe a hypothetical operational environment (e.g., home, office, enterprise, bank, government, etc.) where the users will expect security functionality from the software.
    • Provide a diagram that identifies the systems engineering view of the software in the hypothetical environment. Still Need
    • What are the threats perceived by users of the software in its intended operational environment? (If there are none or very few, then re-evaluate your project selection.)
    • Develop a list of security features in the software (Again, if there are none or very few, then re-evaluate your choice).
  • Team motivation for selecting this project.
  • Open-source project description (What is it?, Contributors, Activity, Use, Popularity, Languages used, platform, documentation sources, etc. You can get some of this information from Github or OpenHubLinks to an external site.)
  • Discuss License, procedures for making contributions, and contributor agreementsStill Need
  • A brief summary of security-related history for the software (E.g., known vulnerabilities, security-related engineering decisions, security feature additions/removal, etc. ).Still Need
  • Include a reflection on your teamwork for this assignment. What issues occurred? How did you resolve them? What did you plan to change moving forward? Still Need

Backup Projects:

OpenBB-Fianance
Mayan-EDMS
IT Flow

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors