header-logo
Suggest Exploit
vendor:
ossim
by:
MohamadReza Mohajerani
8,8
CVSS
HIGH
Multiple CSRF Vectors
N/A
CWE
Product Name: ossim
Affected Version From: Tested on 4.3
Affected Version To: Tested on 4.3
Patch Exists: YES
Related CWE: N/A
CPE: a:alienvault:ossim
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2015

AlienVault – ossim CSRF

Multiple CSRF vectors exists within AlienVault ossim allowing the following attacks: 1)Delete user accounts(ex.admin account) 2)Delete knowledge DB items. The only thing the attacker needs to do is sending the link to the victim via GET request, if the victim authenticated on the ossim and click on the link the following attacks can be occurred.

Mitigation:

AlienVault has released a patch to address this vulnerability.
Source

Exploit-DB raw data:

# Exploit Title: [AlienVault - ossim CSRF]
# Date: [10-5-2015]
# Exploit Author: [MohamadReza Mohajerani]
# Vendor Homepage: [www.alienvault.com]
# Software Link: [https://www.alienvault.com/products/ossim]
# Version: [Tested on 4.3]

Vulnerability Details:

=====================


Multiple CSRF vectors exists within AlienVault ossim allowing the following
attacks:

1)Delete user accounts(ex.admin account)

2)Delete knowledge DB items

Exploit code(s):

===============

The only thing the attacker needs to do is sending the following link to
the victim via GET request , if the victim authenticated on the ossim and
click on the link the following attacks can be occurred :

1)For deleting the
knowledge DB items just send the link below:
https://ossim-ip/ossim/repository/repository_delete.php?id_document=10232


[id_document is the item number which you want to delete (it starts from 1)]

2)For deleting the user accounts (ex.admin account) use the link below :
https://ossim-ip/ossim/session/deleteuser.php?user=admin&_=1444042812845

[the random number (1444042812845) is not important at all and you can
change the number to whatever you want]



Severity Level:

================
High