Opendaylight 1.0 Local File Inclusion / Remote File Inclusion

2014.08.13
Risk: High
Local: No
Remote: Yes
CWE: CWE-22
CWE-98


CVSS Base Score: 6.8/10
Impact Subscore: 6.4/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

Title =================== Opendaylight Vulnerable to Local and Remote File Inclusion in the Netconf (TCP) Service Summary =================== Opendaylight (www.opendaylight.com) is vulnerable to Local and Remote File Inclusion in the Netconf (TCP) Service via an External Entity Injection (XXE).  Opendaylight’s netconf service, when receiving an XML-RPC message, will process any external entities referenced in that message, local or remote.  And will do so using its own running credentials which are root.  So by injecting a reference to a local file, you can extract any file you like from the running system including the shadow file which can be leveraged by an attacker to perform an offline password attack. Affected Products =================== Opendaylight 1.0 (Hydrogen) – Base, Virtualization, and Service Provider Editions CVE =================== CVE-2014-5035 Details =================== “To Be Released Later” Impact =================== Information Disclosure. Disclosure of hashed system credentials, which enables mounting of offline password attacks.  Eventual disclosure of clear-text system credentials. Credits =================== Gregory Pickett (@shogun7273), Hellfire Security ---------- Gregory Pickett, CISSP, GCIA, GPEN


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top