Lucene search

K
nessusThis script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.OSSIM_WEB_CVE-2013-5967.NASL
HistoryJun 26, 2014 - 12:00 a.m.

OSSIM < 4.3.2 Multiple SQL Injection Vulnerabilities

2014-06-2600:00:00
This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
13

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.001

Percentile

40.2%

The version of OSSIM hosted on the remote host has multiple SQL injection vulnerabilities due to a failure to sanitize the ‘date_from’ parameter to multiple scripts in the ‘/RadarReport’ and ‘/geoloc’ paths. A remote, unauthenticated attacker could potentially exploit this vulnerability to execute arbitrary SQL commands.

It is reported that the SQL injection vulnerabilities can also be leveraged to exploit multiple reflected cross-site scripting vulnerabilities; however, Nessus did not test for this.

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(76262);
  script_version("1.8");
  script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/19");

  script_cve_id("CVE-2013-5967");
  script_bugtraq_id(62790, 67180);
  script_xref(name:"EDB-ID", value:"33006");

  script_name(english:"OSSIM < 4.3.2 Multiple SQL Injection Vulnerabilities");
  script_summary(english:"Tries to inject SQL into 'date_from'");

  script_set_attribute(attribute:"synopsis", value:
"An application hosted on the remote web server has multiple SQL
injection vulnerabilities.");
  script_set_attribute(attribute:"description", value:
"The version of OSSIM hosted on the remote host has multiple SQL
injection vulnerabilities due to a failure to sanitize the 'date_from'
parameter to multiple scripts in the '/RadarReport' and '/geoloc'
paths. A remote, unauthenticated attacker could potentially exploit
this vulnerability to execute arbitrary SQL commands.

It is reported that the SQL injection vulnerabilities can also be
leveraged to exploit multiple reflected cross-site scripting
vulnerabilities; however, Nessus did not test for this.");
  script_set_attribute(attribute:"solution", value:
"Upgrade to 4.3.2 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");

  script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
  script_set_attribute(attribute:"exploit_available", value:"true");
  script_set_attribute(attribute:"exploited_by_nessus", value:"true");

  script_set_attribute(attribute:"vuln_publication_date", value:"2013/10/02");
  script_set_attribute(attribute:"patch_publication_date", value:"2013/10/02");
  script_set_attribute(attribute:"plugin_publication_date", value:"2014/06/26");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:alienvault:open_source_security_information_management");
  script_end_attributes();

  script_category(ACT_ATTACK);
  script_family(english:"CGI abuses");

  script_copyright(english:"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("ossim_web_detect.nasl");
  script_require_keys("www/ossim", "www/PHP");
  script_require_ports("Services/www", 443);

  exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");
include("webapp_func.inc");
include("url_func.inc");

get_kb_item_or_exit("www/ossim");
port = get_http_port(default:443, php:TRUE);
app_name = "AlienVault OSSIM";

install = get_install_from_kb(appname:'ossim', port:port, exit_on_fail:TRUE);
report_url = build_url(port:port, qs:install['dir']+'/');

payload = SCRIPT_NAME+'-'+unixtime() + "'";
query = "1984-07-17' UNION SELECT '" + payload;
query = urlencode(
  str        : query,
  unreserved : "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ01234" +
                 "56789=+&_"
);

url = '/RadarReport/radar-iso27001-potential.php?date_from=' + query;
res = http_send_recv3(method:"GET", item:url, port:port, exit_on_fail:TRUE);

# Check if we got a SQL syntax error (vulnerable) or a validation
# error (patched).
pattern = "select count\(\*\) as A5 from datawarehouse\.ssi_user a.*" + payload;
if (
  !preg(string:res[2], pattern:pattern, multiline:TRUE, icase:TRUE) ||
  "attack attempt has been logged" >< res[2] ||
  "Invalid Date." >< res[2]
) audit(AUDIT_WEB_APP_NOT_AFFECTED, app_name, report_url);

# If we got this far, site is vulnerable.
set_kb_item(name:'www/'+port+'/SQLInjection', value:TRUE);
if (report_verbosity > 0)
{
  report =
    '\n' + 'Nessus was able to verify the issue with the following URL :' +
    '\n' +
    '\n' + build_url(port:port, qs:url);
  security_hole(port:port, extra:report);
}
else security_hole(port);

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.001

Percentile

40.2%

Related for OSSIM_WEB_CVE-2013-5967.NASL