vendor:
ECP/Enomalism
by:
Sam Johnston
7.2
CVSS
HIGH
Race condition on $PIDFILE renders 2.1.1 fixes ineffective, Incomplete fixes in 2.1.1/2.2 fail to address stop/restart functions, Root ownership check (ls -l $PIDFILE |grep root) is trivially bypassed, Process check (ps -p $PID |grep enomalism2d) is also trivially bypassed
264, 78, 22
CWE
Product Name: ECP/Enomalism
Affected Version From: All versions of Enomaly ECP/Enomalism before 2.2.1
Affected Version To: 2.2
Patch Exists: YES
Related CWE: CVE-2008-4990, CVE-2009-0390
CPE: enomalism
Other Scripts:
https://www.infosecmatter.com/nessus-plugin-library/?id=30002, https://www.infosecmatter.com/nessus-plugin-library/?id=30001, https://www.infosecmatter.com/nessus-plugin-library/?id=31605, https://www.infosecmatter.com/nessus-plugin-library/?id=43667, https://www.infosecmatter.com/nessus-plugin-library/?id=67634, https://www.infosecmatter.com/nessus-plugin-library/?id=60347, https://www.infosecmatter.com/nessus-plugin-library/?id=33282, https://www.infosecmatter.com/nessus-plugin-library/?id=33281, https://www.infosecmatter.com/nessus-plugin-library/?id=41198, https://www.infosecmatter.com/nessus-plugin-library/?id=40373, https://www.infosecmatter.com/nessus-plugin-library/?id=156994
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: None
2009
Enomaly ECP/Enomalism: Multiple vulnerabilities in enomalism2.sh (redux)
A local attacker could perform a symlink attack to overwrite arbitrary files on the system with root privileges, inject arguments to the 'kill' command to terminate or send arbitrary signals to any process(es) as root or launch a denial of service attack by preventing the virtual machines from starting.
Mitigation:
Change PIDFILE from /tmp/enomalism2.pid to /var/run/enomalism2.pid