Multiple Vulnerabilities found in IBM QRadar chained together allows a remote attacker to bypass authentication and to execute arbitrary commands with root privileges.
The IBM QRadar is an enterprise security information and event management (SIEM) product that collects the logs from log data from Operating system, Vulnerabilities, user activities, behaviors and networking devices. It can be deployed as a hardware, software or virtual appliance-based product.
The vulnerability was reported by independent security researcher Pedro Ribeiro and the vulnerabilities collectively tracked as CVE-2018-1418. National vulnerability database provides Critical Severity rating with Base Score: 9.8.
“The Forensics web application is disabled in QRadar Community Edition, but the code still works, so these vulnerabilities can be exploited in all flavors of QRadar.” says beyond security.
QRadar Contains a built-in Forensic analysis application that contains two components, one servlet running in Java, and the main web application running PHP.
The exploit chain starts by abusing the first servlet component ForensicAnalysisServlet to bypass authentication that chains to the second vulnerability command injection with the PHP web application.
By leveraging PHP web application attackers can download and execute a shell, but with the unprivileged “nobody” user. Technical details can be PoC found in beyond security.
Pedro also escalated the privileges from limited “nobody” user to root by leveraging a corn job query as a local user. He confirms the vulnerability resides with 7.3.0 and 7.3.1 and all versions released since mid-2014 are affected.
IBM has released patches for Affected Products and Versions IBM QRadar SIEM 7.3.0 to 7.3.1 Patch 2 & IBM QRadar SIEM 7.2.0 to 7.2.8 Patch 11.
You can also read the Detailed Explanation of Security Information and Event Management (SIEM).
Zoom has taken a monumental leap forward by introducing Zoom Workplace, an all-encompassing AI-powered platform designed to redefine how we…
Phishing allows hackers to exploit human vulnerabilities and trick users into revealing sensitive information and grant unauthorized access. It's an…
Google has announced a crucial update to its Chrome browser, addressing several vulnerabilities, including two zero-day exploits showcased at the…
Black Lotus Labs discovered a multi-year campaign by TheMoon malware targeting vulnerable routers and turning them into bots for the…
A critical vulnerability in Ray, an open-source AI framework that is widely utilized across various sectors, including education, cryptocurrency, and…
Cybersecurity researchers at Unit 42 have uncovered a sophisticated cyberespionage campaign orchestrated by two Chinese Advanced Persistent Threat (APT) groups…