Document Title:
===============
Ossim SIEM v4.0 - Multiple Cross Site Vulnerabilities
References (Source):
====================
http://www.vulnerability-lab.com/get_content.php?id=679
Release Date:
=============
2012-08-13
Vulnerability Laboratory ID (VL-ID):
====================================
679
Common Vulnerability Scoring System:
====================================
3.5
Product & Service Introduction:
===============================
OSSIM is the most widely used SIEM offering, thanks in no small part to the open source community that has
promoted its use. OSSIM provides all of the capabilities that a security professional needs from a SIEM
offering, event collection, normalization, correlation and incident response - but it also does far more.
Not simply satisfied with integrating data from existing security tools, OSSIM is built on the Unified
Security Management platform which provides a common framework for the deployment, configuration, and
management of your security tools.
Today more than 30 open-source security tools are built into this framework, making OSSIM the fastest way
to start and the easiest way to manage a comprehensive security program. AlienVault provides ongoing
development and support for the project because we believe that everyone should have access to the
sophisticated security technologies that are required to keep us secure. This included the companies that
are too small to afford, the researchers who need a platform to experiment on, and the unsung heroes who
can\\\\\\\'t convince their companies that security is a problem. For users who think they might require the
commercial offering whose proceeds are used to continue supporting this project please visit AlienVault
to find out more.
(Copy of the Vendor Homepage: http://communities.alienvault.com/community/ )
Abstract Advisory Information:
==============================
The Vulnerability Laboratory Research Team discovered multiple cross site scripting vulnerabilities in OSSIM v 4.0, the open source SIEM.
Vulnerability Disclosure Timeline:
==================================
2012-08-13: Public Disclosure
Discovery Status:
=================
Published
Affected Product(s):
====================
AlienVault
Product: Ossim - Open Source 4.0
Exploitation Technique:
=======================
Remote
Severity Level:
===============
Low
Technical Details & Description:
================================
1.1
Multiple persistent input validation vulnerabilities are detected in OSSIM v 4.0, the Open Source SIEM.
The bugs allow remote attackers to implement/inject malicious script code on the application-side.
Successful exploitation of the vulnerability can lead to session hijacking (manager/admin) or stable
context manipulation. Exploitation requires low user inter action & low or medium privileged user account.
The vulnerabilities are located in the proxy.php, reporting.php, schedulereports.php or the updates.php
& the bound vulnerable parameters add domain, filter name, report name & version.
Vulnerable Module(s):
[+] Incidents -> Knowledge DB -> New Document
[+] ossim/vulnmeter/settings.php?disp=new
[+] ossim/inventorysearch/editrule.php
Vulnerable Parameter(s):
[+] [Title] [Text] [Keywords]
[+] [Name] [Description]
[+] [Filter Context] [Filter] [Query] [Predefined list]
1.2
Multiple non persistent cross site scripting vulnerabilities are detected in OSSIM v 4.0, the Open Source SIEM.
The vulnerability allows remote attackers to hijack website customer, moderator or admin sessions with medium or
high required user interaction. The bugs are located on client side in the top.php page, Threat database module,
and the main configuration module with the bound vulnerable url, keywords and find word parameters.
Successful exploitation result in account steal, client side phishing & client-side content request manipulation.
Exploitation requires medium or high user inter action & without privileged web application user account.
Vulnerable Module(s):
[+] TOP
[+] Analysis -> Vulnerabilities -> Threat database
[+] Configuration -> Main
Vulnerable Parameter(s):
[+] url
[+] keywords
[+] find word
Proof of Concept (PoC):
=======================
1.
The persistent vulnerabilities can be exploited by local low privileged user account with low required user inter action.
For demonstration or reproduce ...
Review: Incidents -> Knowledge DB -> New Document - [Title] [Text] [Keywords]
PoC:
URL: http://localhost:8080/ossim/repository/index.php
Review: [Name] [Description]
File: /ossim/vulnmeter/settings.php?disp=new
PoC: ">