what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Infoblox 6.8.4.x OS Command Injection

Infoblox 6.8.4.x OS Command Injection
Posted Jul 9, 2014
Authored by Nate Kettlewell

Infoblox versions 6.4.x.x through 6.8.4.x suffer from a remote OS command injection vulnerability.

tags | exploit, remote
advisories | CVE-2014-3418
SHA-256 | 5afdff9adb497f007948d12021a5b835ae2f1ec8ba755ff8e3c774f2cc1f626c

Infoblox 6.8.4.x OS Command Injection

Change Mirror Download
Product: Network Automation, licensed as:
• NetMRI
• Switch Port Manager
• Automation Change Manager
• Security Device Controller

Vendor: Infoblox
Vulnerable Version(s): 6.4.X.X-6.8.4.X
Tested Version: 6.8.2.11

Vendor Notification: May 12th, 2014
Vendor Patch Availability to Customers: May 16th, 2014
Public Disclosure: July 9th, 2014

Vulnerability Type: OS Command Injection [CWE-78]
CVE Reference: CVE-2014-3418
Risk Level: High
CVSSv2 Base Score: 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Solution Status: Solution Available

Discovered and Provided: Nate Kettlewell, Depth Security ( https://www.depthsecurity.com/ )

------------------------------------------------------------------------
-----------------------

Advisory Details:

Depth Security discovered a vulnerability in the Infoblox Network Automation management web interface. This attack does not require authentication of any kind.

1) OS Command Injection in Infoblox Network Automation Products: CVE-2014-3418

The vulnerability exists due to insufficient sanitization of user-supplied data in in skipjackUsername POST parameter. A remote attacker can inject operating system commands as the root user, and completely compromise the operating system.

The following is the relevant portion of the multipart/form-data POST request to netmri/config/userAdmin/login.tdf

Content-Disposition: form-data; name="skipjackUsername"

admin`ping -n 20 127.0.0.1`

------------------------------------------------------------------------
-----------------------

Solution:

Infoblox immediately released a hotfix to remediate this vulnerability on existing installations (v6.X-NETMRI-20710.gpg).
The flaw was corrected in the 6.8.5 release (created expressly for dealing with this issue), and that release has been put into manufacturing for new appliances.

------------------------------------------------------------------------
-----------------------

Proof of Concept:

In addition to manual exploitation via the above mentioned vector, proof of concept is provided in the form of a module for the metasploit framework.

https://github.com/depthsecurity/NetMRI-2014-3418
------------------------------------------------------------------------
-----------------------

References:

[1] Depth Security Advisory - http://blog.depthsecurity.com/2014/07/os-command-injection-in-infoblox-netmri.html - OS Command Injection in NetMRI.
[2] NetMRI - http://www.infoblox.com/products/network-automation/netmri - NetMRI is an Enterprise Network Management Appliance.
[3] Common Weakness Enumeration (CWE) - http://cwe.mitre.org/ - targeted to developers and security practitioners, CWE is a formal list of software weakness types.
[4] NetMRI Metasploit Module - https://github.com/depthsecurity/NetMRI-2014-3418
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close