AlienVault - OSSIM CSRF

2015.10.26
Credit: Anonymous
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-352

# Exploit Title: [AlienVault - OSSIM CSRF] # Date: [10-5-2015] # Exploit Author: [**************] # Vendor Homepage: [www.alienvault.com] # Software Link: [https://www.alienvault.com/products/ossim] # Version: [4.3] Vulnerability Details: ===================== Multiple CSRF vectors exists within AlienVault ossim allowing the following attacks: 1)Delete user accounts(ex.admin account) 2)Delete knowledge DB items Exploit code(s): =============== The only thing the attacker needs to do is sending the following link to the victim via GET request , if the victim authenticated on the ossim and click on the link the following attacks can be occurred : 1)For deleting the knowledge DB items just send the link below: https://ossim-ip/ossim/repository/repository_delete.php?id_document=1023 2 [id_document is the item number which you want to delete (it starts from 1)] 2)For deleting the user accounts (ex.admin account) use the link below : https://ossim-ip/ossim/session/deleteuser.php?user=admin&_=1444042812845 [the random number (1444042812845) is not important at all and you can change the number to whatever you want] Severity Level: ================ High

References:

https://www.alienvault.com/products/ossim


Vote for this issue:
100%
0%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top