RunRunLevel Web Security Research - AlienVault OSSIM multiple SQL Injection vulnerabilities
Vendor Website : http://www.alienvault.com
INDEX
---------------------------------------1. Background
2. Description
3. Affected Products
4. Vulnerabilities
5. Solution
6. Credit
7. Disclosure Timeline
1. BACKGROUND
---------------------------------------
OSSIM by AlienVault is an Open Source Security Information and Event Management (SIEM) platform, comprising a collection of tools designed to aid network administrator in computer security, intrusion detection and prevention.(Wikipedia)2. DESCRIPTION
---------------------------------------
The RunRunLevel Web Security Research Team discovered several vulnerabilities in the OSSIM web interface. All web vulnerabilities are caused by lack/unproper input validation. The Web Security Reseach Team also found that OSSIM MySQL database was running with root privileges, allowing to a full system compromise of the OSSIM platform.3. AFFECTED PRODUCTS
---------------------------------------
AlienVault OSSIM4.1.2(stable version and below)4. VULNERABILITIES
---------------------------------------
The vulnerabilities can be classified as"SQL Injection". No input validation is performed when processing parameters on the following URL's:4.1/ossim/forensics/base_qry_main.php [action_lst[0] parameter]4.2/ossim/forensics/base_qry_main.php [action_lst[1] parameter]4.3/ossim/forensics/base_qry_main.php [action_lst[18] parameter]4.4/ossim/forensics/base_qry_main.php [action_lst[6] parameter]4.5/ossim/forensics/base_qry_main.php [hostid[0] parameter]4.6/ossim/forensics/base_qry_main.php [sort_order parameter]4.7/ossim/forensics/base_qry_main.php [time[0][8] parameter]4.8/ossim/net/getnet.php[sortname parameter]4.9/ossim/session/users_edit.php[login parameter]4.10/ossim/session/users_edit.php[name parameter]
Together with the SQLi vulns was found that the MySQL Database server was running with system administrator privileges.4.11 MySQL database running with root privileges
5. SOLUTION
---------------------------------------
Vendor contacted, but no response provided.6. CREDIT
---------------------------------------
The vulnerabilities were discovered by the RunRunLevel Web Security Research Team.7. DISCLOSURE TIMELINE
---------------------------------------2013-03-01- Vulnerability Discovered
2013-03-10- Vendor Informed
2013-04-01- No Response from Vendor
2013-05-01- No Response from Vendor
2013-05-09- Public Disclosure