
12 new exploits Linux x86_64 - Reverse Shell Shellcode Gemalto Sentinel License Manager 18.0.1.55505 - Directory Traversal Solarwinds Virtualization Manager - Privilege Escalation Blat 3.2.14 - Stack Overflow Linux/x86 - Bindshell with Configurable Port - 87 bytes Linux x86_64 Shellcode Null-Free Reverse TCP Shell Linux x86 TCP Bind Shell Port 4444 (656 bytes) Tiki-Wiki CMS Calendar 14.2_ 12.5 LTS_ 9.11 LTS_ and 6.15 - Remote Code Execution Linux/Windows/BSD x86_64 execve(_/bin//sh__ {_//bin/sh__ _-c__ _cmd_}_ NULL) Execute Command Shellcode ATCOM PBX IP01_ IP08 _ IP4G_ IP2G4A - Authentication Bypass Roxy Fileman 1.4.4 - Arbitrary File Upload SlimCMS 0.1 - CSRF (Change Admin Password)
51 lines
No EOL
2.1 KiB
Text
Executable file
51 lines
No EOL
2.1 KiB
Text
Executable file
Product: Solarwinds Virtualization Manager
|
|
|
|
Vendor: Solarwinds
|
|
Vulnerable Version(s): < 6.3.1
|
|
Tested Version: 6.3.1
|
|
|
|
Vendor Notification: April 25th, 2016
|
|
Vendor Patch Availability to Customers: June 1st, 2016
|
|
Public Disclosure: June 14th, 2016
|
|
|
|
Vulnerability Type: Security Misconfiguration
|
|
CVE Reference: CVE-2016-3643
|
|
Risk Level: High
|
|
CVSSv2 Base Score: 7.8 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:H/RL:W/RC:C/CR:M/IR:M/AR:M/MAV:L/MAC:L/MPR:L/MUI:N/MS:C/MC:H/MI:H/MA:H)
|
|
Solution Status: Solution Available
|
|
|
|
Discovered and Provided: Nate Kettlewell, Depth Security ( https://www.depthsecurity.com/ )
|
|
|
|
-----------------------------------------------------------------------------------------------
|
|
|
|
Advisory Details:
|
|
|
|
Depth Security discovered a vulnerability in Solarwinds Virtualization Manager appliance.
|
|
This attack requires a user to have an operating system shell on the vulnerable appliance.
|
|
|
|
1) Misconfiguration of sudo in Solarwinds Virtualization Manager: CVE-2016-3643
|
|
|
|
The vulnerability exists due to the miconfiguration of sudo in that it allows any local user to use sudo to execute commands as the superuser.
|
|
A local attacker can obtain root privileges to the operating system regardless of privilege level.
|
|
|
|
-----------------------------------------------------------------------------------------------
|
|
|
|
Solution:
|
|
|
|
Solarwinds has released a hotfix to remediate this vulnerability on existing installations.
|
|
|
|
This flaw as well as several others have been corrected and that release has been put into manufacturing for new appliances.
|
|
|
|
-----------------------------------------------------------------------------------------------
|
|
|
|
Proof of Concept:
|
|
|
|
The following is an example of the commands necessary for a low-privileged user to dump the contents of the "/etc/shadow" file by using sudo.
|
|
|
|
sudo cat /etc/passwd
|
|
|
|
-----------------------------------------------------------------------------------------------
|
|
|
|
References:
|
|
|
|
[1] Solarwinds Virtualization Manager- http://www.solarwinds.com/virtualization-manager - Solarwinds Virtualization Manager provides monitoring and remediation for virtualized environments. |