Summary
ManageEngine EventLog Analyzer is prone to an arbitrary file-upload vulnerability and an unauthorized-access vulnerability.
Impact
Attackers can exploit these issues to execute arbitrary code and gain unauthorized access to the critical sections of the application.
Solution
Ask the Vendor for an update. Workaround:
---------------------------------------------------------------------- 1) Unauthenticated remote code execution
If agents are not used to collect log information, access to the servlet can be disabled by commenting out the following lines in the web.xml file (webapps/event/WEB-INF/web.xml) and restart the service.
<servlet>
<servlet-name>agentUpload</servlet-name>
<servlet-class>com.adventnet.sa.agent.UploadHandlerServlet</servlet-class> </servlet>
<servlet-mapping>
<servlet-name>agentUpload</servlet-name>
<url-pattern>/agentUpload</url-pattern>
</servlet-mapping>
2) Authorization issues
No workaround, reduce the attack surface by disabling unused low privileged accounts like 'guest'.
Insight
1) Unauthenticated remote code execution
ME EventLog Analyzer contains a 'agentUpload' servlet which is used by Agents to send log data as zip files to the central server. Files can be uploaded without authentication and are stored/decompressed in the 'data' subdirectory.
As the decompress procedure is handling the file names in the ZIP file in a insecure way it is possible to store files in the web root of server. This can be used to upload/execute code with the rights of the application server.
2) Authorization issues
The EventLog Analyzer web interface does not check if an authenticated has sufficient permissions to access certain parts of the application. A low privileged user (for example guest) can therefore access critical sections of the web interface, by directly calling the corresponding URLs. This can be used to access the database browser of the application which gives the attacker full access to the database.
Affected
EventLog Analyzer 9.9 Build 9002 and prior are vulnerable.
Detection
Upload a special crafted zip file and check if /openvas.jsp exist afterwards and contains an expected string.
References
Severity
Classification
-
CVE CVE-2014-6037 -
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities