[prev in list] [next in list] [prev in thread] [next in thread] 

List:       full-disclosure
Subject:    [FD] Aerohive Hive Manager and Hive OS Multiple Vulnerabilities
From:       Disclosure <Disclosure () security-assessment ! com>
Date:       2014-08-28 4:51:20
Message-ID: 5BA2A954B70D364EB058EB00B656CB87FB6400 () sa-exch02 ! security-assessment ! local
[Download RAW message or body]

(    , )     (,
  .   '.' ) ('.    ',
   ). , ('.   ( ) (
  (_,) .'), ) _ _,
 /  _____/  / _  \    ____  ____   _____
 \____  \==/ /_\  \ _/ ___\/  _ \ /     \
 /       \/   |    \\  \__(  <_> )  Y Y  \
/______  /\___|__  / \___  >____/|__|_|  /
        \/         \/.-.    \/         \/:wq
                    (x.0)
                  '=.|w|.='
                  _=''"''=.

                presents..

Aerohive Hive Manager and Hive OS Multiple Vulnerabilities

Affected Versions: Aerohive Hive Manager (Stand-alone and Cloud) >= 6.1R3 and HiveOS 6.1R3
PDF: http://www.security-assessment.com/files/documents/advisory/Aerohive%20Hive%20Manager%20and%20Hive%20OS%20Multiple%20Vulnerabilities.pdf


+-------------+
> Description |
+-------------+

This document details multiple vulnerabilities found within the Aerohive Hive Manager and \
HiveOS software. These  vulnerabilities have been disclosed to the vendor on or before the 24th \
of April 2014. 

-- Hive Manager Arbitrary File Disclosure --
Leveraging directory traversal, a malicious user can retrieve arbitrary files from the Hive \
Manager file system. As the  Tomcat instance serving the Hive Manager software runs as the root \
user, this vulnerability can be used to read any  file off the file system, including sensitive \
files such as /etc/shadow.

-- Hive Manager Arbitrary File Upload --
An authenticated malicious user may send a crafted post to the ‘upload’ servlet and upload \
arbitrary files. As the  upload servlet is protected by HTTP basic authentication, this \
requires the knowledge of the scpuser’s password.

-- Hive Manager Debugserver Code Execution --
It was discovered that an authenticated user may send a crafted request to the Hive Manager \
‘debugserver’ servlet  and execute arbitrary commands on the Hive Manager server.

-- Hive Manager Multiple Password Disclosure --
Multiple methods within the Hive Manager web interface were found to expose sensitive \
information such as  usernames and passwords. A malicious entity may leverage these disclosures \
to further compromise the Hive  Manager.

-- Hive Manager Reflected Cross Site Scripting --
Multiple Reflected Cross Site Scripting vulnerabilities were found within the Hive Manager \
software. These  vulnerabilities allow a malicious entity to potentially gain JavaScript \
execution within a legitimate user’s browser.  This is done with the aim of harming the user’s \
browser or hijacking their session.

-- Hive Manager SSH Keys Lacking Passphrase --
An SSH key was found on the Hive Manager file system without any passphrase set. This allows a \
malicious user  with access to the file system to gain unauthorised access to the system with \
root user privileges.

-- Hive Manager Subshell Bypass --
By using a crafted SSH command, a malicious user may gain root access to the Hive Manager with \
a fully functional  bash terminal, effectively bypassing the Aerohive subshell. This allows the \
malicious user to perform tasks on the  underlying CentOS Linux operating system, including the \
retrieval of private keys, passwords and other sensitive  information

-- Hive Manager Unauthenticated Arbitrary File Upload --
The Hive Manager HHMUploadServlet was found to suffer from an Unauthenticated Arbitrary File \
Upload  vulnerability. By sending a crafted packet to the servlet, a malicious entity is able \
to gain arbitrary code execution on  the Hive Manager server.

-- HiveOS Local File Inclusion --
Aerohive HiveOS was found to contain a Local File Inclusion Vulnerability within the web \
administrative interface.  The Local File Inclusion allows a malicious entity to control what \
files are included by the vulnerable PHP page. In  the event that the malicious entity is able \
to control an element on the file system, this results in arbitrary code  execution. As user \
controlled information is present within the log-files of the application, this is easily \
achievable.

-- HiveOS Password Disclosure --
Log files within the HiveOS operating system were found to disclose sensitive information such \
as usernames and  password. A malicious user may leverage this information to further \
compromise the Aerohive deployment or its  users.

-- HiveOS Unauthenticated Firmware Upload --
Insufficient authorisation checking was found to be being performed on certain firmware upload \
functions. This  allows for the upload of a backdoored or otherwise malicious firmware by an \
attacker.

+--------------+
> Exploitation |
+--------------+

Detailed exploitation information and code will be released in December 2014.

+------------+
> Workaround |
+------------+

Update to the latest version of Hive Manager and HiveOS software including the cloud solutions.

+--------+
> Credit |
+--------+

Denis Andzakovic, Scott Bell, Nick Freeman, Thomas Hibbert, Carl Purvis, Pedro Worcel.

+-----------------------------+
> About Security-Assessment.com|
+-----------------------------+

Security-Assessment.com is a New Zealand based world
leader in web application testing, network security
and penetration testing. Security-Assessment.com
services organisations across New Zealand, Australia,
Asia Pacific, the United States and the United
Kingdom.

_______________________________________________
Sent through the Full Disclosure mailing list
http://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic