lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <9E989203DCA0664AB0A1F82C2669321C0D9608F2@DSSBS2011.Depth.intl>
Date: Wed, 9 Jul 2014 14:42:43 +0000
From: Nate Kettlewell <nate@...thsecurity.com>
To: "fulldisclosure@...lists.org" <fulldisclosure@...lists.org>
Subject: [FD] CVE-2014-3418 - OS Command Injection Infoblox Network
	Automation

Product: Network Automation, licensed as:

*         NetMRI

*         Switch Port Manager

*         Automation Change Manager

*         Security Device Controller



Vendor: Infoblox

Vulnerable Version(s): 6.4.X.X-6.8.4.X

Tested Version: 6.8.2.11



Vendor Notification: May 12th, 2014

Vendor Patch Availability to Customers: May 16th, 2014 Public Disclosure: July 9th, 2014



Vulnerability Type: OS Command Injection [CWE-78] CVE Reference: CVE-2014-3418 Risk Level: High

CVSSv2 Base Score: 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C) Solution Status: Solution Available



Discovered and Provided: Nate Kettlewell, Depth Security ( https://www.depthsecurity.com/ )



------------------------------------------------------------------------

-----------------------



Advisory Details:



Depth Security discovered a vulnerability in the Infoblox Network Automation management web interface. This attack does not require authentication of any kind.



1) OS Command Injection in Infoblox Network Automation Products: CVE-2014-3418



The vulnerability exists due to insufficient sanitization of user-supplied data in in skipjackUsername POST parameter. A remote attacker can inject operating system commands as the root user, and completely compromise the operating system.



The following is the relevant portion of the multipart/form-data POST request to netmri/config/userAdmin/login.tdf



Content-Disposition: form-data; name="skipjackUsername"



admin`ping -n 20 127.0.0.1`



------------------------------------------------------------------------

-----------------------



Solution:



Infoblox immediately released a hotfix to remediate this vulnerability on existing installations (v6.X-NETMRI-20710.gpg).

The flaw was corrected in the 6.8.5 release (created expressly for dealing with this issue), and that release has been put into manufacturing for new appliances.



------------------------------------------------------------------------

-----------------------



Proof of Concept:



In addition to manual exploitation via the above mentioned vector, proof of concept is provided in the form of a module for the metasploit framework.



https://github.com/depthsecurity/NetMRI-2014-3418

------------------------------------------------------------------------

-----------------------



References:



[1] Depth Security Blog - http://blog.depthsecurity.com/2014/07/os-command-injection-in-infoblox-netmri.html  - OS Command Injection in NetMRI.

[2] NetMRI - http://www.infoblox.com/products/network-automation/netmri - NetMRI is an Enterprise Network Management Appliance.

[3] Common Weakness Enumeration (CWE) - http://cwe.mitre.org/ - targeted to developers and security practitioners, CWE is a formal list of software weakness types.

[4] NetMRI Metasploit Module - https://github.com/depthsecurity/NetMRI-2014-3418

_______________________________________________
Sent through the Full Disclosure mailing list
http://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ