Document Title: =============== Ossim SIEM v4.0 - Multiple Cross Site Vulnerabilities References (Source): ==================== http://www.vulnerability-lab.com/get_content.php?id=679 Release Date: ============= 2012-08-13 Vulnerability Laboratory ID (VL-ID): ==================================== 679 Common Vulnerability Scoring System: ==================================== 3.5 Product & Service Introduction: =============================== OSSIM is the most widely used SIEM offering, thanks in no small part to the open source community that has promoted its use. OSSIM provides all of the capabilities that a security professional needs from a SIEM offering, event collection, normalization, correlation and incident response - but it also does far more. Not simply satisfied with integrating data from existing security tools, OSSIM is built on the Unified Security Management platform which provides a common framework for the deployment, configuration, and management of your security tools. Today more than 30 open-source security tools are built into this framework, making OSSIM the fastest way to start and the easiest way to manage a comprehensive security program. AlienVault provides ongoing development and support for the project because we believe that everyone should have access to the sophisticated security technologies that are required to keep us secure. This included the companies that are too small to afford, the researchers who need a platform to experiment on, and the unsung heroes who can\\\\\\\'t convince their companies that security is a problem. For users who think they might require the commercial offering whose proceeds are used to continue supporting this project please visit AlienVault to find out more. (Copy of the Vendor Homepage: http://communities.alienvault.com/community/ ) Abstract Advisory Information: ============================== The Vulnerability Laboratory Research Team discovered multiple cross site scripting vulnerabilities in OSSIM v 4.0, the open source SIEM. Vulnerability Disclosure Timeline: ================================== 2012-08-13: Public Disclosure Discovery Status: ================= Published Affected Product(s): ==================== AlienVault Product: Ossim - Open Source 4.0 Exploitation Technique: ======================= Remote Severity Level: =============== Low Technical Details & Description: ================================ 1.1 Multiple persistent input validation vulnerabilities are detected in OSSIM v 4.0, the Open Source SIEM. The bugs allow remote attackers to implement/inject malicious script code on the application-side. Successful exploitation of the vulnerability can lead to session hijacking (manager/admin) or stable context manipulation. Exploitation requires low user inter action & low or medium privileged user account. The vulnerabilities are located in the proxy.php, reporting.php, schedulereports.php or the updates.php & the bound vulnerable parameters add domain, filter name, report name & version. Vulnerable Module(s): [+] Incidents -> Knowledge DB -> New Document [+] ossim/vulnmeter/settings.php?disp=new [+] ossim/inventorysearch/editrule.php Vulnerable Parameter(s): [+] [Title] [Text] [Keywords] [+] [Name] [Description] [+] [Filter Context] [Filter] [Query] [Predefined list] 1.2 Multiple non persistent cross site scripting vulnerabilities are detected in OSSIM v 4.0, the Open Source SIEM. The vulnerability allows remote attackers to hijack website customer, moderator or admin sessions with medium or high required user interaction. The bugs are located on client side in the top.php page, Threat database module, and the main configuration module with the bound vulnerable url, keywords and find word parameters. Successful exploitation result in account steal, client side phishing & client-side content request manipulation. Exploitation requires medium or high user inter action & without privileged web application user account. Vulnerable Module(s): [+] TOP [+] Analysis -> Vulnerabilities -> Threat database [+] Configuration -> Main Vulnerable Parameter(s): [+] url [+] keywords [+] find word Proof of Concept (PoC): ======================= 1. The persistent vulnerabilities can be exploited by local low privileged user account with low required user inter action. For demonstration or reproduce ... Review: Incidents -> Knowledge DB -> New Document - [Title] [Text] [Keywords] PoC: URL: http://localhost:8080/ossim/repository/index.php Review: [Name] [Description] File: /ossim/vulnmeter/settings.php?disp=new PoC: "> Review: Threat database - [Keywords] PoC: ">