Vulnerability Details : CVE-2014-3804
Public exploit exists!
The av-centerd SOAP service in AlienVault OSSIM before 4.7.0 allows remote attackers to execute arbitrary commands via a crafted (1) update_system_info_debian_package, (2) ossec_task, (3) set_ossim_setup admin_ip, (4) sync_rserver, or (5) set_ossim_setup framework_ip request, a different vulnerability than CVE-2014-3805.
Products affected by CVE-2014-3804
- cpe:2.3:a:alienvault:open_source_security_information_management:*:*:*:*:*:*:*:*
- cpe:2.3:a:alienvault:open_source_security_information_management:4.1:*:*:*:*:*:*:*
- cpe:2.3:a:alienvault:open_source_security_information_management:4.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:alienvault:open_source_security_information_management:4.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:alienvault:open_source_security_information_management:4.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:alienvault:open_source_security_information_management:4.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:alienvault:open_source_security_information_management:4.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:alienvault:open_source_security_information_management:4.2:*:*:*:*:*:*:*
- cpe:2.3:a:alienvault:open_source_security_information_management:4.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:alienvault:open_source_security_information_management:4.6:*:*:*:*:*:*:*
- cpe:2.3:a:alienvault:open_source_security_information_management:4.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:alienvault:open_source_security_information_management:4.3:*:*:*:*:*:*:*
- cpe:2.3:a:alienvault:open_source_security_information_management:4.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:alienvault:open_source_security_information_management:4.0:*:*:*:*:*:*:*
- cpe:2.3:a:alienvault:open_source_security_information_management:4.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:alienvault:open_source_security_information_management:4.5:*:*:*:*:*:*:*
- cpe:2.3:a:alienvault:open_source_security_information_management:4.4:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-3804
91.80%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2014-3804
-
AlienVault OSSIM av-centerd Command Injection
Disclosure Date: 2014-05-05First seen: 2020-04-26exploit/linux/ids/alienvault_centerd_soap_execThis module exploits a code execution flaw in AlienVault 4.6.1 and prior. The vulnerability exists in the av-centerd SOAP web service, where the update_system_info_debian_package method uses perl backticks in an insecure way, allowing command injection. This module
CVSS scores for CVE-2014-3804
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
CWE ids for CVE-2014-3804
-
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-3804
-
http://zerodayinitiative.com/advisories/ZDI-14-200/
ZDI-14-200 | Zero Day Initiative
-
https://www.exploit-db.com/exploits/42708/
Alienvault OSSIM av-centerd - Util.pm sync_rserver Command Execution (Metasploit) - Linux remote Exploit
-
http://zerodayinitiative.com/advisories/ZDI-14-202/
ZDI-14-202 | Zero Day Initiative
-
http://forums.alienvault.com/discussion/2690
-
http://zerodayinitiative.com/advisories/ZDI-14-197/
ZDI-14-197 | Zero Day InitiativeVendor Advisory
-
http://zerodayinitiative.com/advisories/ZDI-14-196/
ZDI-14-196 | Zero Day Initiative
-
http://zerodayinitiative.com/advisories/ZDI-14-201/
ZDI-14-201 | Zero Day Initiative
Jump to