Vulnerable Systems:
* ServersCheck Monitoring Software version 8.8.6 and prior
1.1
Multiple persistent input validation vulnerabilities are detected on application-side of Serverscheck.
The remote vulnerability allows local low privileged user accounts or remote attackers to manipulate specific sections, areas or content requests via Java or HTML script code injection.
Vulnerable Module(s): (Persistent)
[*] New Team / Team List
[*] New User / User List
[*] Windows Account Edits / Windowsbenutzer Berechtigungsnachweis
[*] Rules Size Add
[*] MSN Accounts Rules & copied Functions
[*] ServersCheck Protokolldateibetrachter: scan.txt
[*] SNMP Trapkonfiguration
[*] Axis Camera - Add & Configuration
[*] Neue berwachungsregel / Observation Rules
[*] User Diagram / Add
[*] ODBC Protocol
[*] SMS TEST SCRIPT
Picture(s):
../2.png
../3.png
1.2
Multiple non-persistent input validation vulnerabilities are detected on application-side of Serverscheck.
The vulnerability allows an attacker to hijack customer/admin sessions. Successful exploitation requires high user inter action.
Vulnerable Module(s):
[*] Downtime
[*] Linenumber
[*] ID
[*] Checks2def (Footer/Header)
[*] Timeline
[*] Definere Einstellungen zur Dienstanmeldung
[*] Device Graphs
[*] View Graphs
[*] Rules History
Picture(s):
../1.png
1.3
A cross site request forgery vulnerability is detected on the Dienstanmeldung formular. Attackers can force a logon via cross site request forgery attack.
Vulnerable Module(s):
[*] Einstellungen zur Dienstanmeldung
1.4
A not restricted insert mas?file= parameter request allows an attacker to include local files without right permissions. A successful exploitation process can result in a path traversal.
Proof of Concept:
-================
The different vulnerabilities can be exploited by local low privileged user accounts, software users or remote attackers. For demonstration or reproduce ...
<form method=post action=checks2alerts.html name=alerts
target="main"><td> <td><input type=hidden value=""
name=linenumber><input type=hidden value="" name=check> <input
type=button value='FEHLER MELDUNGEN' alt="/checks2alerts.html?
linenumber=&check=&type=down&KeepThis=true&TB_iframe=true&height=400&width=850"
title='Bearbeite Alarme f r den FEHLER
Status' class='thickbox buttonalertsdown'></td></form>
<form method=post action="" name=alerts target="main" ><td>
</td><td><input class='buttonnok' type=submit value="
REGEL L SCHEN" onclick="return deleteit('>"<NON-PERSITENT SCRIPTCODE
HERE!','');" onmouseover="return overlib('Durch klicken auf dieses Icon
k nnen
Sie die berwachungsregel l schen. Diese Operation kann nicht r ckg ngig
gemacht werden.', LEFT);" onmouseout="return nd();"></td></form>
</tr></table></div><br><br>
1.3
Code Review: Cross Site Request Forgery (Force|Non Persistent)
<body bgcolor="white" leftmargin=0 topmargin=0 rightmargin=0 marginwidth=0>
<div
style="padding-left:5px;padding-right:5px;padding-top:10px;padding-bottom:10px;width:90%">
<img src="/output/images/generalsettings.jpg" border="0" align="left">
<div style='padding-left:5px;padding-top:5px;'><font color=black
style="font-size: 16px;"><strong>
Definere Einstellungen zur Dienstanmeldung.
</strong></font>
<hr align="left" width="97%" size="1" color="#ff9900" noshade
style="padding-top:0px; filter:progid:DXImageTransform.Microsoft.Gradient
(startColorStr='#ffcc00', endColorStr='white', gradientType='1')"> <br>
ServersCheck l uft als ein Dienst auf diesem Computer. Standardm ig
laufen alle Dienste von Windows unter dem lokalen Systemkonto.
Ein Dienst hat Zugang auf die Maschine, wo er gerade l uft, aber es ist
ihm ein Remotezugriff andere Computer untersagt. F r Windows
basierende Checks (Plattenspeicherplatz, Speicher, CPU...), muss der
ServersCheck Monitoring-Dienst unter einem Windows Admin-Konto
laufen.<br><br>
Setze hier die Dom ne oder den System-Admin Benutzernamen mit Passwort.
Zum Auslassen dieser Option bitte leer lassen.<br><br>
<form action=popup_service2.html method=post name=service setting><table
cellpadding=5><tr><td>
Administrator Benutzername</td><td align=right>
<input type=text size=20 name=user></td></tr><tr><td>
Administrator Passwort</td><td align=right>
<input type=password size=20 name=pass></td></tr></table>
<br><br><input type=submit class='buttonok' value=">> AKTUALISIERUNG" >
<input type=button class='buttonnok'
value="SKIP" Onclick="window.location='/popup1.html';">
</form></div></div><br><br>
1.4
Code Review: Local Directory Traversal & Information Disclosure
<HTML>
<HEAD>
<TITLE>ServersCheck 21 Day Evaluation Edition - version 8.0.8</TITLE>
<META http-equiv=content-type content="text/html">
<LINK HREF="/output/css/serverscheck.css" rel="stylesheet" type="text/css">
<LINK HREF="/output/css/thickbox.css" rel="stylesheet" type="text/css"
media="screen" />
<script type="text/javascript" src="/output/js/jquery.js"></script>
<script type="text/javascript" src="/output/js/thickbox.js"></script>
<META HTTP-EQUIV="Pragma" CONTENT="no-cache">
</HEAD><!-- DE -->
<body bgcolor="white" leftmargin=0 topmargin=0 rightmargin=0 marginwidth=0>
<div style='padding-left:5px;padding-top:5px;'><font color=black
style="font-size: 16px;"><strong>
ServersCheck Protokolldateien</strong></font>
<hr align="left" width="97%" size="1" color="#ff9900" noshade
style="padding-top:0px; filter:progid:DXImageTransform.Microsoft.
Gradient(startColorStr='#ffcc00', endColorStr='white',
gradientType='1')"><br>
Um die Protokolldatei anzusehen, klicken Sie auf den Hyperlink, um sie
zu ffnen.<br><ul>
<li><a
href="/viewlogfile2.html?file=graphs-errors.log&">graphs-errors.log</a></li>
<li><a
href="/viewlogfile2.html?file=monitoring_manager_2010-3-19.log&">monitoring_manager_2010-3-19.log</a></li>
<li><a
href="/viewlogfile2.html?file=statuschange_2010-3-19.log&">statuschange_2010-3-19.log</a></li>
<li><a href="/viewlogfile2.html?file=watcher.log&">watcher.log</a></li>
</ul></div><br><br> </BODY></HTML>
DT ID References:
http://localhost:1272/viewlogfile2.html?file=
... ?file=
to see all logs together use
http://localhost:1272/viewlogfile.html?file=/
Risk
1.1 - The security risk of the persistent vulnerabilities are estimated as medium(+).
1.2 - The security risk of the non-persistent vulnerabilities are estimated as low(+).
1.3 - The security risk of the cross site request forgery attack is estimated as low(+).
1.4 - The security risk of the path traversal vulnerability is estimated is high(-).
1.5 - The security risk of the sms misconfiguration/bug is estimated as low(+).
Disclosure Timeline:
2011-09-27: Public or Non-Public Disclosure