AlienVault OSSIM 'av-centerd' get_file() Information Disclosure

high Nessus Plugin ID 76214

Synopsis

The remote host is affected by an information disclosure vulnerability.

Description

The remote host is running a version of AlienVault Open Source Security Information Management (OSSIM) that is affected by an information disclosure vulnerability in the 'av-centerd' SOAP service due to a failure to sanitize user input to the 'get_file' method. A remote, unauthenticated attacker can exploit this vulnerability to read arbitrary files with root privileges.

Note that this version is reportedly also affected by two remote code execution vulnerabilities. However, Nessus did not test for these additional issues.

Solution

Upgrade to 4.8.0 or later.

See Also

http://forums.alienvault.com/discussion/2806

https://www.zerodayinitiative.com/advisories/ZDI-14-207/

Plugin Details

Severity: High

ID: 76214

File Name: ossim_soap_4_8_0_information_disclosure.nasl

Version: 1.9

Type: remote

Family: CGI abuses

Published: 6/25/2014

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:N/A:N

CVSS Score Source: CVE-2014-4153

Vulnerability Information

CPE: cpe:/a:alienvault:open_source_security_information_management

Exploit Available: true

Exploit Ease: No exploit is required

Exploited by Nessus: true

Patch Publication Date: 6/2/2014

Vulnerability Publication Date: 6/13/2014

Reference Information

CVE: CVE-2014-4153

BID: 68018