Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Possible Security Vulnerabilities #30

Closed
jacobamey opened this issue Nov 20, 2013 · 10 comments
Closed

Possible Security Vulnerabilities #30

jacobamey opened this issue Nov 20, 2013 · 10 comments
Assignees
Labels

Comments

@jacobamey
Copy link

Note, these should not be a huge issue if utilizing a proper firewall. But it might be something you would want to look into and fix anyways.

These where found by a Nessus scan performed against a server running Monitorix.

First One:

Severity: HIGH

Exploit:

Goscript go.cgi Arbitrary Command Execution

Description

The remote host is running GoScript. The installed version fails to properly sanitize user-supplied input to the 'go.cgi' script. An unauthenticated, remote attacker could exploit this flaw to execute arbitrary commands on the remote host.

Solution

There is no known solution at this time.

See Also

http://archives.neohapsis.com/archives/bugtraq/2004-08/0037.html

Plugin Output

It was possible to execute the command 'id' on the remote host
by requesting the following URL :

http://10.19.75.76:8080/amPortal/action/go.cgi|id|

Second One:

Severity: Medium

Exploit

Web Server Generic Cookie Injection

Description

The remote host is running a web server that fails to adequately sanitize request strings of malicious JavaScript. By leveraging this issue, an attacker may be able to inject arbitrary cookies. Depending on the structure of the web application, it may be possible to launch a 'session fixation' attack using this mechanism.

Solution

Contact the vendor for a patch or upgrade.

See Also

http://en.wikipedia.org/wiki/Session_fixation
http://www.owasp.org/index.php/Session_Fixation
http://www.acros.si/papers/session_fixation.pdf
http://projects.webappsec.org/Session-Fixation

Plugin Output

The request string used to detect this flaw was :

/<script>document.cookie=%22testzgsf=9268;%22</script>

The output was :

HTTP/1.0 404 Not found
Date: Wed, 20 Nov 2013 13:34:54 -0500
Server: Monitorix HTTP Server
Connection: close
Content-Type: text/html; charset=UTF-8

[...]

<title>404 Not Found</title>

Not Found

The requested URL /<script>document.cookie="testzgsf=9268;"</script> was not found on this server.


Monitorix HTTP Server listening at localhost Port 8080 [...]

Third one:

Severity: Medium

Exploit

Web Server Generic XSS

Description

The remote host is running a web server that fails to adequately sanitize request strings of malicious JavaScript. By leveraging this issue, an attacker may be able to cause arbitrary HTML and script code to be executed in a user's browser within the security context of the affected site.

Solution

Contact the vendor for a patch or upgrade.

See Also

http://en.wikipedia.org/wiki/Cross-site_scripting

Plugin Output

The request string used to detect this flaw was :

/<script>cross_site_scripting.nasl</script>.asp

The output was :

HTTP/1.0 404 Not found
Date: Wed, 20 Nov 2013 13:36:20 -0500
Server: Monitorix HTTP Server
Connection: close
Content-Type: text/html; charset=UTF-8

Not Found

The requested URL /<script>cross_site_scripting.nasl</script>.asp was no
t found on this server.


Monitorix HTTP Server listening at localhost Port 8080
@ghost ghost assigned mikaku Nov 21, 2013
@mikaku
Copy link
Owner

mikaku commented Nov 21, 2013

Hi Jacob,

Oh man, you found it!
There is indeed a lack in sanitize these special characters (|, <, >, ...).
I'll release a new version 3.3.1 in order to just fix this bug.

I guess that sanitizing the input string will fix the three issues, otherwise let me know.

Thanks a lot for your feedback!
Best regards.

mikaku added a commit that referenced this issue Nov 21, 2013
…ver which led a number of security vulnerabilities. #30
@mikaku mikaku closed this as completed Nov 21, 2013
@jacobamey
Copy link
Author

Wow, talk about a quick turn around!

I'll update Monitorix on our Base Image. (when it hits epel repo) and rerun the scan. Ill let you know my findings.

Thanks again for a quick turn around.

@mikaku
Copy link
Owner

mikaku commented Nov 21, 2013

You're very welcome!
And yes please, let me know your findings.

Thanks.

@jacobamey
Copy link
Author

You got the big one!

The Goscript go.cgi Arbitrary Command Execution is no longer an issue. This was rated by Nessus as a High vulnerability.

the other two are still there though. They are rated at a Medium on the bad scale.

  1. Web Server Generic Cookie Injection
  2. Web Server Generic XSS

I have sent you an email containing more details on these issues.

Good job getting rid of the goScript issue, that was the big one.

@mikaku mikaku reopened this Nov 22, 2013
@mikaku
Copy link
Owner

mikaku commented Nov 22, 2013

Yeah, I've received it.
I'll take it a look.

Thanks!

@jacobamey
Copy link
Author

thank you!

@mikaku
Copy link
Owner

mikaku commented Nov 25, 2013

Jacob,

I've finally addressed the last two issues (XSS and Cookie Injection).
You might want to check it using the devel branch or just wait a few days to get the new Monitorix version.

Many thanks again for your advice.

@jacobamey
Copy link
Author

Ok, this week is pretty slow at work(Thanksgiving). If I have time I will check it out and confirm for you tomorrow. If not a few days worst case. Thanks again for working on this.

@jacobamey
Copy link
Author

All confirmed Fixed, I manually modified a Monitorix on our end with your modifications from your Dev Branch. I then ran a few different scans.

  • Basic Internal
  • Basic External
  • Basic Web
  • PCI-DSS audits (section 11.2.2)

Scans, all came back clean. We look good to go. I'll update all systems when you push to master and the repos are up to date.

Thanks again for a quick turn around.

@mikaku
Copy link
Owner

mikaku commented Nov 27, 2013

Perfect!
Thank you very much for your invaluable testings.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

2 participants