[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

OSSIM v2.2 Multiple Vulnerabilities

Author
Nahuel Grisolia
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-11338
Category
web applications
Date add
17-03-2010
Platform
unsorted
===================================
OSSIM v2.2 Multiple Vulnerabilities
===================================

Advisory Name: Arbitrary File Download in OSSIM
 
Vulnerability Class: Arbitrary File Download
 
Release Date: 03-16-2010
 
Affected Applications: Confirmed in OSSIM 2.2. Other versions may also be affected.
 
Affected Platforms: Multiple
 
Local / Remote: Remote
 
Severity: High – CVSS: 7.8 (AV:N/AC:L/Au:N/C:C/I:N/A:N)
 
Researcher: Nahuel Grisol?a
 
Vendor Status: Fixed in OSSIM 2.2.1
 
Reference to Vulnerability Disclosure Policy: http://www.cybsec.com/vulnerability_policy.pdf
 
Vulnerability Description:
 
OSSIM is prone to a Arbitrary File Download vulnerability because the software fails to adequately
sanitize user-supplied input.
The file “download.php” in “/ossiminstall/repository/” directory suffers from an Arbitrary File
Download vulnerability due to the missed input validation on the "file" parameter; in particular no
validation is done on path traversal patterns.
 
Proof of Concept:
 
http://192.168.2.35/ossim/repository/download.php?file=../../../../../../../../etc/passwd&name=passwd.txt
 
Impact:
 
Through this vulnerability remote and unauthenticated users could download any file accessible by the
Web server and by reading source files a malicious user could read important information such as
database passwords.
 
Solution: Fixed in OSSIM 2.2.1. See http://www.alienvault.com/community.php?section=News
 
Vendor Response:
 
02-03-2010 – Initial contact
03-11-2010 – OSSIM 2.2.1 is available
 
Advisory Name: Arbitrary File Upload in OSSIM
 
Vulnerability Class: Arbitrary File Upload
 
Release Date: 03-16-2010
 
Affected Applications: Confirmed in OSSIM 2.2. Other versions may also be affected.
 
Affected Platforms: Multiple
 
Local / Remote: Remote
 
Severity: High – CVSS: 9 (AV:N/AC:L/Au:S/C:C/I:C/A:C)
 
Researcher: Nahuel Grisol?a
 
Vendor Status: Fixed in OSSIM 2.2.1
 
Reference to Vulnerability Disclosure Policy: http://www.cybsec.com/vulnerability_policy.pdf
 
Vulnerability Description:
 
The vulnerability is caused due to an improper check in
“/ossiminstall/repository/repository_attachment.php” script, allowing the upload of files with arbitrary
extensions to a folder inside the Webroot. This can be exploited to e.g. execute arbitrary PHP code by
uploading a specially crafted PHP script containing some kind of Web Shell.
 
Proof of Concept:
 
Select a file with any extension (including PHP) and upload it using the form. The file will be available
inside Webroot.
 
Impact:
 
Direct execution of arbitrary PHP code in the Web Server.
 
Solution: Fixed in OSSIM 2.2.1. See http://www.alienvault.com/community.php?section=News
 
Advisory Name: Remote Command Execution in OSSIM
 
Vulnerability Class: Remote Command Execution
 
Release Date: 03-16-2010
 
Affected Applications: Confirmed in OSSIM 2.2. Other versions may also be affected.
 
Affected Platforms: Multiple
 
Local / Remote: Remote
 
Severity: High – CVSS: 9 (AV:N/AC:L/Au:S/C:C/I:C/A:C)
 
Researcher: Nahuel Grisol?a
 
Vendor Status: Fixed in OSSIM 2.2.1
 
Reference to Vulnerability Disclosure Policy: http://www.cybsec.com/vulnerability_policy.pdf
 
Vulnerability Description:
 
OSSIM is prone to a remote command execution vulnerability because the software fails to adequately
sanitize user-supplied input.
Successful attacks can compromise the affected software and possibly the computer running OSSIM.
 
Proof of Concept:
 
http://192.168.X.X/ossim/sem/storage_graphs.php?uniqueid=199&what=;cat /etc/passwd >
/tmp/passwd;
http://192.168.X.X/ossim/sem/storage_graphs2.php?uniqueid=199&what=;cat /etc/passwd >
/tmp/passwd;
http://192.168.X.X/ossim/sem/storage_graphs3.php?uniqueid=199&what=;cat /etc/passwd >
/tmp/passwd;
http://192.168.X.X/ossim/sem/storage_graphs4.php?uniqueid=199&what=;cat /etc/passwd >
/tmp/passwd;
 
Impact:
 
Direct execution of arbitrary code in the context of Web server user.
 
Solution: Fixed in OSSIM 2.2.1. See http://www.alienvault.com/community.php?section=News
 
Vendor Response:
 
02-03-2010 – Initial contact
03-11-2010 – OSSIM 2.2.1 is available



#  0day.today [2024-10-05]  #