0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
GroundWork Monitor Enterprise 6.7.0 SQL Injection / Command Execution
title: Multiple high risk vulnerabilities (part 2) product: GroundWork Monitor Enterprise vulnerable version: 6.7.0 fixed version: none - optional technical bulletin released impact: High homepage: http://www.gwos.com found: 2013-02-11 by: Johannes Greil SEC Consult Vulnerability Lab https://www.sec-consult.com ======================================================================= Vendor/product description: ------------------------------------------------------------------------------ "GroundWork Monitor is the leading open platform for monitoring the availability and performance of enterprise business services, applications and infrastructure. It can live and monitor both on premises and in the cloud. As an open platform, it is easily integrated with common IT service management processes and tools and is competitively and simply priced." URL: http://www.gwos.com/features/ ------------------------------------------------------------------------------ Business recommendation: ------------------------------------------------------------------------------ SEC Consult identified multiple vulnerabilities with high risk within the components of the "GroundWork Monitor Enterprise" solution. The scope of the test, where the vulnerabilities have been identified, was a very short evaluation crash-test (~1 PD, part 2) which the software utterly failed. Some components have been spot-checked, others have not been tested at all (e.g. cloud components). The recommendation of SEC Consult is to immediately switch off existing GroundWork systems until further security measures and thorough follow-up security tests have been implemented and performed. ------------------------------------------------------------------------------ Vulnerability overview/description: ------------------------------------------------------------------------------ The following vulnerability description has been categorized into the components where the vulnerabilities have been identified. 1) NeDi component ~~~~~~~~~~~~~~~~~ In order to exploit the following vulnerabilities an attacker has to have low privileged "user" access level rights within GroundWork. The NeDi application itself thinks that an admin user has logged in and gives full access rights! 1.1) Access to sensitive files A low-privileged attacker is able to gain access to NeDi configuration files or database dumps or Tomcat status context by just entering a URL. 1.2) Privilege escalation through command execution A low privileged "user" account is able to access the "System File Overview" feature of NeDi which allows editing of files and hence the execution of arbitrary operating system commands. Affected script: /nedi/html/System-Files.php 1.3) Direct OS command injection A low privileged "user" account is able to execute arbirary OS commands through missing input validation within the "System / NeDi" menu functionality. NeDi allows to scan internal IP addresses which can be exploited by a classic OS command injection payload. Affected script: /nedi/html/System-NeDi.php 1.4) SQL injection & execution of arbitrary SQL statements A low privileged "user" account can execute arbitrary SQL statements within the current schema (nedi) of the PostgreSQL database and furthermore also exploit SQL injection vulnerabilities. Affected scripts: /nedi/html/System-Export.php /nedi/html/Devices-List.php 1.5) Open redirection NeDi is affected by an open redirection vulnerability. If an authenticated victim of the attack clicks on a special URL he will be redirected to a website controlled by the attacker. 1.6) Multiple XSS vulnerabilities The NeDi component suffers from multiple XSS vulnerabilities because no input validation is being performed. An attacker is able to steal user accounts/sessions and potentially gain higher privileges within GroundWork. 2) Cacti component ~~~~~~~~~~~~~~~~~~ In order to exploit the following vulnerabilities an attacker has to have low privileged "user" access level rights within GroundWork. 2.1) Insufficient authorization A low-privileged user is able to access and change all configuration settings within the Cacti component including user accounts and passwords. 2.2) Bundled Cacti version is outdated The Cacti version 0.8.7g that is bundled with GroundWork is already affected by at least two known vulnerabilities (Cross-Site Request-Forgery and SQL injection). 3) Noma component ~~~~~~~~~~~~~~~~~ The following security flaws can only be exploited with a valid "admin" session, but at least the cross-site request forgery flaw in combination with the permanent XSS flaw can be exploited by outside attackers in order to gain administrative access to GroundWork. 3.1) Cross-site request forgery An attacker can use cross-site request forgery to perform arbitrary web requests with the identity of the victim without being noticed by the victim. Although responses to these requests are not delivered to the attacker, in many cases it is sufficient to be able to compromise the integrity of the victim’s information stored on the site or to perform certain, possibly compromising requests to other sites. 3.2) Multiple reflected and permanent cross-site scripting The Noma component suffers from multiple XSS vulnerabilities because no input validation is being performed. An attacker is able to steal user accounts/sessions and potentially gain higher privileges within GroundWork. 3.3) SQL injection Due to insufficient input validation, the application allows the injection of direct SQL commands. By exploiting the vulnerability, an attacker gains access to all records stored in the database with the privileges of the web application user. ------------------------------------------------------------------------------ Proof of concept: ------------------------------------------------------------------------------ Detailed proof of concept URLs and exploits have been removed from this advisory as the underlying security issues will not be fixed by GroundWork and only be addressed by authentication and authorization changes. 1) NeDi component ~~~~~~~~~~~~~~~~~ 1.1) Access to sensitive files Access config files: [...] If a legitimate user dumped some database contents through standard NeDi functionality, it will be reachable directly with "user" rights: [...] Tomcat Status [...] 1.2) Privilege escalation through command execution The following component allows editing of files of a given whitelisted array. At least one of the whitelisted files is a PHP file which can be edited and accessed through the webserver: Step a) Access start URL [...] Step b) Go to menu "[...]": [...] Step c) Edit "[...]" and enter payload: [...] Step d) Execute arbitrary OS commands: [...] 1.3) Direct OS command injection Affected URL: [...] Affected parameters, at least: [...] Payload: [...] 1.4) SQL injection & execution of arbitrary SQL statements Execute arbitrary SQL statements with "[...]" parameter: [...] It has not been investigated whether changes to the NeDi database will affect or propagate to other GroundWork components! Unfiltered input in at least "[...]" parameter: [...] 1.5) Open redirection [...] 1.6) Multiple XSS vulnerabilities [...] 2) Cacti component ~~~~~~~~~~~~~~~~~~ 2.1) Insufficient authorization A low-privileged user is able to access/change all configuration settings, e.g.: [...] 2.2) Bundled Cacti version is outdated [...] 3) Noma component ~~~~~~~~~~~~~~~~~ 3.1) Cross-site request forgery Store permanent XSS payload via CSRF attack: [...] Delete arbitrary entries via CSRF: [...] 3.2) Multiple reflected and permanent cross-site scripting Permanent XSS: [...] Reflected XSS: [...] 3.3) SQL injection [...] ------------------------------------------------------------------------------ Vulnerable / tested versions: ------------------------------------------------------------------------------ The vulnerabilities have been tested in the currently latest available version v6.7.0. SEC Consult tested the pre-installed Ubuntu image 6.7.0-br287-gw157 with a GroundWork Monitor Core test license. SEC Consult strongly assumes that many further vulnerabilities exist and previous GroundWork versions are affected too. ------------------------------------------------------------------------------ Vendor contact timeline: ------------------------------------------------------------------------------ 2013-02-12: Contacting vendor via direct email contact (after trying to establish contact since 14th January, see advisory part 1) 2013-02-13: Vendor, info from engineering: patch for 27th February planned; Patch only addresses few issues (Referer checks) and not critical vulnerabilities SEC Consult: proper fixes needed, not a "workaround patch" 2013-02-26: Vendor: Email reply regarding conference call 2013-02-28: Conference call 2013-03-04: GroundWork provides optional technical bulletin for review 2013-03-05: SEC Consult states that the optional technical bulletin is not enough and does not fix the underlying issues within source code Informing US-CERT about the status and pending release 2013-03-06: Contacting local CERT teams 2013-03-06: GroundWork informs their customers 2013-03-07: Release of optional technical bulletin by GroundWork 2013-03-08: SEC Consult releases coordinated security advisory without proof of concept ------------------------------------------------------------------------------ Solution: ------------------------------------------------------------------------------ GroundWork does not offer patches for the identified security vulnerabilities. An optional technical bulletin is available by GroundWork that restricts access to GroundWork components by adding a SSO authentication layer for the affected components. Furthermore, configuration changes are suggested by GroundWork that disable "user" privilege access for some applications and require "admin" access rights in the future: https://kb.groundworkopensource.com/display/SUPPORT/SA6.7.0-1+Some+web+components+allow+bypass+of+role+access+controls This recommendation by GroundWork is not sufficient and therefore not suggested by SEC Consult. In order to mitigate the risk, the vulnerabilities have to be fixed within the source code. In secure environments, such as operating centers where this software is for instance used, it is highly undesirable to use insecure applications. ------------------------------------------------------------------------------ Workaround: ------------------------------------------------------------------------------ Implement the suggestions of the technical bulletin. Keep in mind that the underlying security issues are not being addressed by the bulletin. Furthermore, use additional measures to secure the application, e.g. but not limited to strict network segmentation. Only allow administrators to access the server. Secure all accounts with strong passwords & disable standard accounts. ------------------------------------------------------------------------------ Advisory URL: ------------------------------------------------------------------------------ https://www.sec-consult.com/en/Vulnerability-Lab/Advisories.htm ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ SEC Consult Unternehmensberatung GmbH Office Vienna Mooslackengasse 17 A-1190 Vienna Austria Tel.: +43 / 1 / 890 30 43 - 0 Fax.: +43 / 1 / 890 30 43 - 25 Mail: research at sec-consult dot com https://www.sec-consult.com http://blog.sec-consult.com EOF Johannes Greil / @2013 # 0day.today [2024-11-15] #