Infoblox 6.8.4.x OS Command Injection

2014.07.10
Risk: High
Local: No
Remote: Yes
CWE: CWE-78


Ogólna skala CVSS: 10/10
Znaczenie: 10/10
Łatwość wykorzystania: 10/10
Wymagany dostęp: Zdalny
Złożoność ataku: Niska
Autoryzacja: Nie wymagana
Wpływ na poufność: Pełny
Wpływ na integralność: Pełny
Wpływ na dostępność: Pełny

Product: Network Automation, licensed as: NetMRI Switch Port Manager Automation Change Manager Security Device Controller Vendor: Infoblox Vulnerable Version(s): 6.4.X.X-6.8.4.X Tested Version: 6.8.2.11 Vendor Notification: May 12th, 2014 Vendor Patch Availability to Customers: May 16th, 2014 Public Disclosure: July 9th, 2014 Vulnerability Type: OS Command Injection [CWE-78] CVE Reference: CVE-2014-3418 Risk Level: High CVSSv2 Base Score: 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C) Solution Status: Solution Available Discovered and Provided: Nate Kettlewell, Depth Security ( https://www.depthsecurity.com/ ) ------------------------------------------------------------------------ ----------------------- Advisory Details: Depth Security discovered a vulnerability in the Infoblox Network Automation management web interface. This attack does not require authentication of any kind. 1) OS Command Injection in Infoblox Network Automation Products: CVE-2014-3418 The vulnerability exists due to insufficient sanitization of user-supplied data in in skipjackUsername POST parameter. A remote attacker can inject operating system commands as the root user, and completely compromise the operating system. The following is the relevant portion of the multipart/form-data POST request to netmri/config/userAdmin/login.tdf Content-Disposition: form-data; name="skipjackUsername" admin`ping -n 20 127.0.0.1` ------------------------------------------------------------------------ ----------------------- Solution: Infoblox immediately released a hotfix to remediate this vulnerability on existing installations (v6.X-NETMRI-20710.gpg). The flaw was corrected in the 6.8.5 release (created expressly for dealing with this issue), and that release has been put into manufacturing for new appliances. ------------------------------------------------------------------------ ----------------------- Proof of Concept: In addition to manual exploitation via the above mentioned vector, proof of concept is provided in the form of a module for the metasploit framework. https://github.com/depthsecurity/NetMRI-2014-3418 ------------------------------------------------------------------------ ----------------------- References: [1] Depth Security Advisory - http://blog.depthsecurity.com/2014/07/os-command-injection-in-infoblox-netmri.html - OS Command Injection in NetMRI. [2] NetMRI - http://www.infoblox.com/products/network-automation/netmri - NetMRI is an Enterprise Network Management Appliance. [3] Common Weakness Enumeration (CWE) - http://cwe.mitre.org/ - targeted to developers and security practitioners, CWE is a formal list of software weakness types. [4] NetMRI Metasploit Module - https://github.com/depthsecurity/NetMRI-2014-3418

Referencje:

http://blog.depthsecurity.com/2014/07/os-command-injection-in-infoblox-netmri.html


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top