Infoblox 6.8.2.11 – OS Command Injection

  • 作者: Nate Kettlewell
    日期: 2014-07-10
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/34030/
  • Product: Network Automation, licensed as:
    • NetMRI
    • Switch Port Manager
    • Automation Change Manager
    • Security Device Controller
    
    Vendor: Infoblox
    Vulnerable Version(s): 6.4.X.X-6.8.4.X
    Tested Version: 6.8.2.11
    
    Vendor Notification: May 12th, 2014 
    Vendor Patch Availability to Customers: May 16th, 2014
    Public Disclosure: July 9th, 2014 
    
    Vulnerability Type: OS Command Injection [CWE-78]
    CVE Reference: CVE-2014-3418
    Risk Level: High 
    CVSSv2 Base Score: 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
    Solution Status: Solution Available
    
    Discovered and Provided: Nate Kettlewell, Depth Security ( https://www.depthsecurity.com/ )
    
    ------------------------------------------------------------------------
    -----------------------
    
    Advisory Details:
    
    Depth Security discovered a vulnerability in the Infoblox Network Automation management web interface. This attack does not require authentication of any kind.
    
    1) OS Command Injection in Infoblox Network Automation Products: CVE-2014-3418
    
    The vulnerability exists due to insufficient sanitization of user-supplied data in in skipjackUsername POST parameter. A remote attacker can inject operating system commands as the root user, and completely compromise the operating system.
    
    The following is the relevant portion of the multipart/form-data POST request to netmri/config/userAdmin/login.tdf
    
    Content-Disposition: form-data; name="skipjackUsername"
    
    admin`ping -n 20 127.0.0.1`
    
    ------------------------------------------------------------------------
    -----------------------
    
    Solution:
    
    Infoblox immediately released a hotfix to remediate this vulnerability on existing installations (v6.X-NETMRI-20710.gpg). 
    The flaw was corrected in the 6.8.5 release (created expressly for dealing with this issue), and that release has been put into manufacturing for new appliances.
    
    ------------------------------------------------------------------------
    -----------------------
    
    Proof of Concept:
    
    In addition to manual exploitation via the above mentioned vector, proof of concept is provided in the form of a module for the metasploit framework.
    
    https://github.com/depthsecurity/NetMRI-2014-3418
    ------------------------------------------------------------------------
    -----------------------
    
    References:
    
    [1] Depth Security Advisory - http://blog.depthsecurity.com/2014/07/os-command-injection-in-infoblox-netmri.html- OS Command Injection in NetMRI.
    [2] NetMRI - http://www.infoblox.com/products/network-automation/netmri - NetMRI is an Enterprise Network Management Appliance.
    [3] Common Weakness Enumeration (CWE) - http://cwe.mitre.org/ - targeted to developers and security practitioners, CWE is a formal list of software weakness types.
    [4] NetMRI Metasploit Module - https://github.com/depthsecurity/NetMRI-2014-3418