vendor:
Observium Commercial
by:
Dolev Farhi
7,5
CVSS
HIGH
Authenticated remote code execution
N/A
CWE
Product Name: Observium Commercial
Affected Version From: CE 0.16.7533
Affected Version To: CE 0.16.7533
Patch Exists: No
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2016
Observium Commercial – Authenticated RCE
Using either CSRF or by editing the whois binary field in the Observium webui under Settings-> System Path, an attacker may also change the Path to either [whois, mtr, nmap] to any bash command, and by hitting the url: http://<ObserviumIP>/netcmd.php?cmd=whois&query=8.8.8.8 using any user on Observium (even low privileged) we can trigger a code execution. For example, setting up a listener and a CSRF.
Mitigation:
Ensure that the whois binary field in the Observium webui under Settings-> System Path is not editable by low privileged users.