Vulnerabilities > CVE-2018-1247 - XXE vulnerability in RSA Authentication Manager

047910
CVSS 7.1 - HIGH
Attack vector
LOCAL
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
HIGH
Integrity impact
NONE
Availability impact
HIGH
local
low complexity
rsa
CWE-611
nessus
exploit available

Summary

RSA Authentication Manager Security Console, version 8.3 and earlier, contains a XML External Entity (XXE) vulnerability. This could potentially allow admin users to cause a denial of service or extract server data via injecting a maliciously crafted DTD in an XML file submitted to the application.

Exploit-Db

descriptionRSA Authentication Manager 8.2.1.4.0-build1394922 / < 8.3 P1 - XML External Entity Injection / Cross-Site Flashing / DOM Cross-Site Scripting. CVE-2018-12...
fileexploits/java/webapps/44634.txt
idEDB-ID:44634
last seen2018-05-24
modified2018-05-16
platformjava
port
published2018-05-16
reporterExploit-DB
sourcehttps://www.exploit-db.com/download/44634/
titleRSA Authentication Manager 8.2.1.4.0-build1394922 / < 8.3 P1 - XML External Entity Injection / Cross-Site Flashing / DOM Cross-Site Scripting
typewebapps

Nessus

NASL familyCGI abuses
NASL idEMC_RSA_AM_8_3_P1.NASL
descriptionThe version of EMC RSA Authentication Manager running on the remote host is prior to 8.3 Patch 1 (8.3.0.1). It is, therefore affected by the following vulnerabilities: - A flaw exists with the Security Console due to improper parsing of XML data. An authenticated remote attacker, with a specifically crafted XML data, could potentially cause a denial of service or access sensitive information. (CVE-2018-1247) - A flaw exists with the Security Console, Operation Console and Self-Service Console due to improper sanitization of input when handling specially crafted requests. A context-dependent attacker could inject custom http headers, potentially poisoning the http cache and redirecting users. (CVE-2018-1248)
last seen2020-06-01
modified2020-06-02
plugin id109683
published2018-05-10
reporterThis script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/109683
titleEMC RSA Authentication Manager < 8.3 Patch 1 Multiple Vulnerabilities (DSA-2018-086)
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(109683);
  script_version("1.7");
  script_cvs_date("Date: 2019/11/04");

  script_cve_id("CVE-2018-1247", "CVE-2018-1248");
  script_bugtraq_id(104107, 104113);

  script_name(english:"EMC RSA Authentication Manager < 8.3 Patch 1 Multiple Vulnerabilities (DSA-2018-086)");
  script_summary(english:"Checks the version of EMC RSA Authentication Manager.");

  script_set_attribute(attribute:"synopsis", value:
"An application running on the remote host is affected by multiple
vulnerabilities.");
  script_set_attribute(attribute:"description", value:
"The version of EMC RSA Authentication Manager running on the remote
host is prior to 8.3 Patch 1 (8.3.0.1). It is, therefore affected by
the following vulnerabilities:

  - A flaw exists with the Security Console due to improper parsing of
    XML data. An authenticated remote attacker, with a specifically
    crafted XML data, could potentially cause a denial of service or
    access sensitive information. (CVE-2018-1247)

  - A flaw exists with the Security Console, Operation Console and
    Self-Service Console due to improper sanitization of input when
    handling specially crafted requests. A context-dependent attacker
    could inject custom http headers, potentially poisoning the http
    cache and redirecting users. (CVE-2018-1248)");
  script_set_attribute(attribute:"see_also", value:"https://seclists.org/fulldisclosure/2018/May/18");
  script_set_attribute(attribute:"solution", value:
"Upgrade to EMC RSA Authentication Manager version 8.3 Patch 1
(8.3.0.1) or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2018-1248");

  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");

  script_set_attribute(attribute:"vuln_publication_date", value:"2018/05/04");
  script_set_attribute(attribute:"patch_publication_date", value:"2018/05/04");
  script_set_attribute(attribute:"plugin_publication_date", value:"2018/05/10");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:emc:rsa_authentication_manager");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:rsa:authentication_manager");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"CGI abuses");

  script_copyright(english:"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("emc_rsa_am_detect.nbin");
  script_require_keys("www/emc_rsa_am");
  script_require_ports("Services/www", 7004);

  exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("http.inc");
include("misc_func.inc");

get_kb_item_or_exit("www/emc_rsa_am");

app_name = "EMC RSA Authentication Manager";
port = get_http_port(default:7004);
kb_prefix = "www/"+port+"/emc_rsa_am/";

report_url = get_kb_item_or_exit(kb_prefix + "url");
version = get_kb_item_or_exit(kb_prefix + "version");
version_display = get_kb_item_or_exit(kb_prefix + "version_display");

fix = '8.3.0.1';
fix_display = "8.3 Patch 1";

if (version =~ "^[0-8]\." && ver_compare(ver:version, fix:fix, strict:FALSE) < 0)
{
  report =
    '\n  URL               : ' + report_url +
    '\n  Installed version : ' + version_display +
    '\n  Fixed version     : ' + fix_display +
    '\n';
  security_report_v4(port:port, extra:report, severity:SECURITY_WARNING);
  exit(0);
}
else audit(AUDIT_WEB_APP_NOT_AFFECTED, app_name, report_url);

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/147666/SA-20180516-0.txt
idPACKETSTORM:147666
last seen2018-05-17
published2018-05-16
reporterMantas Juskauskas
sourcehttps://packetstormsecurity.com/files/147666/RSA-Authentication-Manager-XML-Injection-Cross-Site-Scripting.html
titleRSA Authentication Manager XML Injection / Cross Site Scripting