Vulnerability CVE-2016-7955


Published: 2017-03-15

Description:
The logcheck function in session.inc in AlienVault OSSIM before 5.3.1, when an action has been created, and USM before 5.3.1 allows remote attackers to bypass authentication and consequently obtain sensitive information, modify the application, or execute arbitrary code as root via an "AV Report Scheduler" HTTP User-Agent header.

See advisories in our WLB2 database:
Topic
Author
Date
High
Alienvault OSSIM / USM 5.3.0 Authentication Bypass
Peter Lapp
08.03.2017

Type:

CWE-264

(Permissions, Privileges, and Access Controls)

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.5/10
6.4/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Alienvault -> Ossim 
Alienvault -> Unified security management 

 References:
http://www.securityfocus.com/archive/1/540224/100/0/threaded
http://www.zerodayinitiative.com/advisories/ZDI-16-517/
https://www.alienvault.com/forums/discussion/7765/alienvault-v5-3-1-hotfix

Copyright 2024, cxsecurity.com

 

Back to Top