Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

[R1] ManageEngine OpManager NMS Server Multiple Vulnerabilities

Critical

Synopsis

During plugin authoring and testing, Tenable discovered several additional vulnerabilities in ManageEngine OpManager.

#1 NMS Server Multiple Method Remote DoS

OpManager uses a custom NMS server written in java that runs in the JVM shared by all OpManager components. The NMS server has FE (frontend) and BE (backend) components that listen on arbitrary adjacent ports (e.g. TCP port 49197, 49253, and 49254 during our testing). These services are easy to identify remotely by sending a crafted request, to which the server will send a serialized response back. The code that first deserializes the packets does not appear to have sanity checks for lengths, or even to see if a field exists. It is possible to send malformed packets to the server repeatedly until the JVM memory is exhausted, or trigger other errors which cause the JVM to restart and deny service until an administrator restarts the service. Tenable created a script (opmanager_exploit4.py) for the vendor that simply sent fuzzed input that triggers such errors leading to an immediate crash, and does not require authentication.

#2 NMS BE Server REFRESH_CLIENTCOUNT Command Java Object Deserialization Remote Code Execution

This vulnerability was successfully exploited on builds 1150 and 1200. On build 1150, the JVM is a low enough version that we can utilize a vulnerable class it ships with. For 1200 (latest version at the time of testing) commons-beanutils ships with a class vulnerable to code injection with object deserialization. The easiest way to exploit this is by sending a crafted 'REFRESH_CLIENTCOUNT' command and control the data to be deserialized. Tenable created a PoC that utilizes a OpManager version dependent payload.bin. For build 1200, an example payload that utilizes commons-beanutils executes the command 'cmd /c whoami > ../help/nessus_1.txt' (under windows commands are run as 'nt authority\system' by default, which is not good we hear). The file can be remotely accessed from the management web server to verify that the attack was successful (e.g. http://[target]/help/nessus_1.txt). For build 1150, the payload utilizing JRE classes work and executes 'cmd.exe /C whoami > help/test_nessus12345678.txt' as nt_authority\system. Again, this file can be remotely accessed from the management web server to verify that the attack was successful (e.g http://[host]:8080/help/test_nessus12345678.txt).

OpManager also ships with Apache Commons FileUpload 1.3.1+, that contains an object called DiskFileItem, which is normally harmless. However, the object can be modified after it is serialized to behave in ways that were not intended. Specifically we can modify DiskFileItem to:

  1. Create a new file anywhere the Java process has permission.
  2. Write anything we would like to that new file.
  3. We can also move (copy and delete) any file on the remote system that we have permission to.

There are two limitations though:

  1. We don’t control the filename. This is generated by DiskFileItem class as upload_$uuid_$counter.tmp.
  2. Files are created using the File.createTempFile() interface. That means the lifetime of the file is totally dependent on the usage of deleteOnExit(), how long the JVM runs, and if it is moved after creation (If the move is done by the exploit then it will still be deleted. However, if the move is done by the InvokerTransformer exploit then it will not be deleted). It is our observation that files live for ~2 minutes when created by NetIQ Sentinel.

Using a 'frohoff' ysoserial payload, an unauthenticated remote attacker can copy and delete arbitrary files.

#3 TFTP Server Unauthenticated File Upload Stored XSS

By default, an unauthenticated user can upload arbitrary files via TFTP that can be accessed under the "tftp_files" directory on the management web server, by an authenticated user. Uploaded files will appear at http://[target]/tftp_files/[uploaded_file]

This is clearly undesirable, as an attacker can upload HTML files that contain malicious JavaScript XSS payloads that could help a remote attacker with gaining access to the admin interface (e.g. cookie stealing). Note that the web server will not run .JSP files unfortunately, but will serve just about any other extension.

#4 TFTP Server Remote Path Disclosure Weakness

In the minor annoyance category, the TFTP server will also disclose the full system path if provided a malformed request. Don't say we never publish PoCs! Consider it a reward for reading this far:

[[email protected] ~]$ tftp 192.168.24.70
tftp> get *
Error code 1: File Not Found C:\ManageEngine\OpManager\tftp_files\*

Solution

ManageEngine has released OpManager 12.2 Build 12200 to address these issues.

Disclosure Timeline

2016-03-31 - Issues discovered
2016-04-06 - Submitted to ZDI for consideration, case int3grate0003
2016-04-11 - ZDI declines
2016-04-13 - Issue reported to vendor via [email protected] address.
2016-05-17 - Ping vendor for update
2016-07-07 - Ping vendor for update
2016-07-08 - Vendor replies with input, 1 - 3 will be fixed in 12.1 or 12.2
2016-07-12 - Ping vendor, ask for ETA on 12.1
2016-08-18 - Ping vendor for udpate
2016-08-23 - Vendor says both to be fixed in 12.2, targeted end of September
2016-09-20 - Ping vendor to see if still on track for September release
2016-10-19 - Ping vendor for update
2016-10-31 - Vendor says 12.2 delayed due to last minute show stoppers. Scheduled for Nov 3 release.
2016-11-24 - Ping vendor for update
2016-11-25 - Vendor says 12.2 was released a couple days ago

All information within TRA advisories is provided “as is”, without warranty of any kind, including the implied warranties of merchantability and fitness for a particular purpose, and with no guarantee of completeness, accuracy, or timeliness. Individuals and organizations are responsible for assessing the impact of any actual or potential security vulnerability.

Tenable takes product security very seriously. If you believe you have found a vulnerability in one of our products, we ask that you please work with us to quickly resolve it in order to protect customers. Tenable believes in responding quickly to such reports, maintaining communication with researchers, and providing a solution in short order.

For more details on submitting vulnerability information, please see our Vulnerability Reporting Guidelines page.

If you have questions or corrections about this advisory, please email [email protected]

Risk Information

Tenable Advisory ID
TRA-2016-36
Credit

Nicholas Miles, Tenable Network Security

Katie Sexton, Tenable Network Security

Jacob Baines, Tenable Network Security

CVSSv2 Base / Temporal Score
10.0 / 8.3
CVSSv2 Vector
(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C)
Additional Keywords
"OopsManager"
Affected Products
ManageEngine OpManager 12.0 Build 1200
Risk Factor
Critical

Advisory Timeline

2016-11-28 - [R1] Initial Release
tenable.io

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable.io Vulnerability Management trial also includes Tenable Lumin, Tenable.io Web Application Scanning and Tenable.cs Cloud Security.

tenable.io BUY

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

Choose Your Subscription Option:

Buy Now

Try Nessus Professional Free

FREE FOR 7 DAYS

Nessus® is the most comprehensive vulnerability scanner on the market today.

NEW - Nessus Expert Now Available

Nessus Expert adds even more features, including external attack surface scanning, and the ability to add domains and scan cloud infrastructure. Click here to Try Nessus Expert.

Fill out the form below to continue with a Nessus Professional Trial.

Buy Nessus Professional

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save. Add Advanced Support for access to phone, community and chat support 24 hours a day, 365 days a year.

Select Your License

Buy a multi-year license and save.

Add Support and Training

Tenable.io

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable.io Vulnerability Management trial also includes Tenable Lumin, Tenable.io Web Application Scanning and Tenable.cs Cloud Security.

Tenable.io BUY

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

Choose Your Subscription Option:

Buy Now

Try Tenable.io Web Application Scanning

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable.io platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Your Tenable Web Application Scanning trial also includes Tenable.io Vulnerability Management, Tenable Lumin and Tenable.cs Cloud Security.

Buy Tenable.io Web Application Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

5 FQDNs

$3,578

Buy Now

Try Tenable.io Container Security

Enjoy full access to the only container security offering integrated into a vulnerability management platform. Monitor container images for vulnerabilities, malware and policy violations. Integrate with continuous integration and continuous deployment (CI/CD) systems to support DevOps practices, strengthen security and support enterprise policy compliance.

Buy Tenable.io Container Security

Tenable.io Container Security seamlessly and securely enables DevOps processes by providing visibility into the security of container images – including vulnerabilities, malware and policy violations – through integration with the build process.

Try Tenable Lumin

Visualize and explore your Cyber Exposure, track risk reduction over time and benchmark against your peers with Tenable Lumin.

Your Tenable Lumin trial also includes Tenable.io Vulnerability Management, Tenable.io Web Application Scanning and Tenable.cs Cloud Security.

Buy Tenable Lumin

Contact a Sales Representative to see how Lumin can help you gain insight across your entire organization and manage cyber risk.

Try Tenable.cs

Enjoy full access to detect and fix cloud infrastructure misconfigurations and view runtime vulnerabilities. Sign up for your free trial now. To learn more about the trial process click here.

Your Tenable.cs Cloud Security trial also includes Tenable.io Vulnerability Management, Tenable Lumin and Tenable.io Web Application Scanning.

Contact a Sales Rep to Buy Tenable.cs

Contact a Sales Representative to learn more about Tenable.cs Cloud Security and see how easy it is to onboard your cloud accounts and get visibility into both cloud misconfigurations and vulnerabilities within minutes.

Try Nessus Expert Free

FREE FOR 7 DAYS

Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

Already have Nessus Professional?
Upgrade to Nessus Expert free for 7 days.

Buy Nessus Expert

Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

Select Your License

Buy a multi-year license and save more.

Add Support and Training