SSD Advisory – Tripwire IP360 Local File Inclusion

Credit to Author: Maor Schwartz| Date: Wed, 15 Feb 2017 07:16:18 +0000

Vulnerabilities Summary
The following advisory describes a Local File Inclusion (LFI) vulnerability found in Tripwire IP360 version 7.2.6. Tripwire IP360 is a enterprise-class vulnerability and risk assessment, it’s provides visibility into the enterprise network, including all networked devices and their associated operating systems and application.

Credit
An independent security researcher Mohammed Shameem has reported this vulnerability to Beyond Security’s SecuriTeam Secure Disclosure program

Vendor response
Tripwire has stated 7.2.6 which was vulnerable has reached end of life. No other version of Tripwire is affected by this LFI vulnerability. Tripwire customers still using version 7.2.6 should upgrade to version 7.5 or newer which is supported.

Vulnerabilities Details
Tripwire IP360 version 7.2.6 suffers from Local File Inclusion vulnerability.

While browsing the “Help” section of the product, it’s pops up the following window:

The highlighted section in the image is fetched with URL:

Parameter “url” is vulnerable to LFI.

Parameter “class” is a php page located at “/hive/ui/IP360/private/states”.

The vulnerable code can be found in the “url” parameter handling:

file_get_contents is the vulnerable code which reads entire file into string and echoed back using “$resource” without proper handling.

Proof of Concept

  1. Setup Proxy and Login to the web interface of the Tripwire IP360 scanner
  2. Click on the Help link on top right corner
  3. Intercept the request with above given parameter
  4. Manipulate the “url” parameter value to “../../../../../../../../../../../etc/passwd” and observe the server response.

An attacker might carry out one or more of the following attacks:

  • Gather usernames via an “/etc/passwd” file
  • Get useful information from the log files, such as “/apache/logs/error.log” or “/apache/logs/access.log
  • Gather db Username and passwords
  • Look at the web source code and possible find more vulnerability.

https://blogs.securiteam.com/index.php/feed