Infoblox - OS Command Injection / Weak MySQL Password Vulnerability

ID 1337DAY-ID-22426
Type zdt
Reporter Nate Kettlewell
Modified 2014-07-10T00:00:00


Infoblox versions 6.4.x.x through 6.8.4.x suffer from a remote OS command injection and use a default login of root with password root on their MySQL instances.

                                            Product: Network Automation, licensed as:
•         NetMRI
•         Switch Port Manager
•         Automation Change Manager
•         Security Device Controller
Vendor: Infoblox
Vulnerable Version(s): 6.4.X.X-6.8.4.X
Tested Version:
Vendor Notification: May 12th, 2014
Vendor Patch Availability to Customers: May 16th, 2014
Public Disclosure: July 9th, 2014
Vulnerability Type: OS Command Injection [CWE-78]
CVE Reference: CVE-2014-3418
Risk Level: High
CVSSv2 Base Score: 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Solution Status: Solution Available
Discovered and Provided: Nate Kettlewell, Depth Security ( )
Advisory Details:
Depth Security discovered a vulnerability in the Infoblox Network Automation management web interface. This attack does not require authentication of any kind.
1) OS Command Injection in Infoblox Network Automation Products: CVE-2014-3418
The vulnerability exists due to insufficient sanitization of user-supplied data in in skipjackUsername POST parameter. A remote attacker can inject operating system commands as the root user, and completely compromise the operating system.
The following is the relevant portion of the multipart/form-data POST request to netmri/config/userAdmin/login.tdf
Content-Disposition: form-data; name="skipjackUsername"
admin`ping -n 20`

Infoblox immediately released a hotfix to remediate this vulnerability on existing installations (v6.X-NETMRI-20710.gpg).
The flaw was corrected in the 6.8.5 release (created expressly for dealing with this issue), and that release has been put into manufacturing for new appliances.

2) Weak password on local MySQL database: CVE-2014-3419

The vulnerability exists due to a weak password used for local MySQL access

An authenticated user with shell access to the operating system can access the contents of any database in the local MySQL instance using the local MySQL client (“mysql –u root –p”) with the following credentials:

Username: root
Password: root

Sensitive information such as SNMP community names and network device credentials are encrypted inside of the database.


The vendor has released a hotfix to remediate this vulnerability on existing installations. The flaw was corrected in the 6.8.5 release.
Proof of Concept:
In addition to manual exploitation via the above mentioned vector, proof of concept is provided in the form of a module for the metasploit framework.

# [2018-01-05]  #