Ixia ATI Update 2018-22 (345359)

Defects Resolved

Ticket Info
DE9130 Removed the extra "OK" message when using CRAM_MD5 authentication. Adding extra space to the message when using CRAM_MD5.
DE10031 Updated meta data to include CVE reference for several strikes.
DE10032 Renamed Strike cve_2009_2015_unauthenticated_remote_dns_change_exploit.xml to unauthenticated_remote_dns_change_exploit.xml (E15-0sr01).
DE10078 Added an additional check for strikes that send HTTP POST to include a Content-Length: 0 header if containing an empty body. Per RFC 7230: "a Content-Length header field is normally sent in a POST request even when the value is 0 (indicating an empty payload body)."
DE10079 Strike for CVE-2015-2051 (E15-4kz01): - fixed strike keywords; - removed extra return characters from HTTP client request. 
Strike for CVE-2012-1823 (E12-0ij01): - fixed strike description and keywords; - appended missing forward slash in URI.
Strike for CVE-2013-6026 (E13-7ne01): - fixed strike description and keywords; - removed unneeded spaces from User Agent list.
DE10080 Minor fixes for HTTP traffic for the following strikes: Badblue Directory Traversal (E02-09101), CVE-2013-2010 Wordpress Total Cache PHP Code Execution (E13-zho01), CVE-2013-1599 Dlink IP Camera Auth Arbitrary Command Exec (E13-zng01), CVE-2014-0098 Apache HTTP Server mod_log_config DOS (E14-32q01), CVE-2017-15715 Apache httpd Filesmatch Policy Bypass (E18-3gub1), CVE-2015-2824 WordPress Simple Ads Manager SQLi (E15-56g01), CVE-2014-3704 Drupal Preauth SQLi (E14-5uw01).
DE10083 Added an open for session 4 and put close sessions after each trans blocks for better readability for Strike E16-8bk01.
DE10096 Fixed meta data, CVE reference and BID for Strike D17-0fux1.
DE10100 Deleted extra CRLF's inserted in headers for Strike E18-0k0n1.

Enhancements

Ticket Info
US89235 Added missing files to the list of TLS certificates for the HTTPS applications.
US91536 Added TLS SNI support for web-based and non-web-based applications that were missing the extension.
US91637 The NAT tag was added to the following SuperFlows: BreakingPoint Raw 2.5m Data FTP Enterprise Google Hangouts Twitter View Favorites TLSv1.2 Google Play Sandvine Bandwidth TLSv1.2 Financial SMBv2 File Download BreakingPoint FIX Session BreakingPoint Pandora (iPhone) Raw UDP Enterprise

New Strikes (13)

CVSS ID References Category Info
10.0 E18-0q3a1 BID-105679
CVE-2018-9206
CVSS-10.0 (AV:N/AC:L/AU:N/C:C/I:C/A:C)
EXPLOITDB-45584
Exploits This strike exploits an arbitrary file upload vulnerability in BlueImp Jquery File Upload widget. The vulnerability is due to the complete lack of server-side authorization or sanitization when handling a file upload. An attacker is thus able to create arbitrary files on the server which in most cases leads to remote arbitrary code execution.
7.6 D18-0jq11 BID-103990
CVE-2018-0953
CVSS-7.6 (AV:N/AC:H/AU:N/C:C/I:C/A:C)
EXPLOITDB-44694
GOOGLE-1531
Denial This strike exploits a vulnerability in the Microsoft Edge browser. Specifically, the vulnerability exists in the Javascript Chakra engine. It is possible to craft Javascript in such a way that the JITed code does not check the input value, which can lead to type confusion. This may lead to a denial of service condition in the browser, or potentially remote code execution.
7.5 E18-0omo1 CVE-2018-7312
CVSS-7.5 (AV:N/AC:L/AU:N/C:P/I:P/A:P)
EXPLOITDB-44162
Exploits This strike exploits a SQL injection vulnerability in the Alexandria Book Library component for Joomla!. The vulnerability is due to the improper sanitization of requests sent to the application. An attacker could exploit this vulnerability by sending specifically crafted packets, potentially resulting in the execution of SQL commands which may lead to information disclosure.
7.5 E18-0z271 CVE-2018-16299
CVSS-7.5 (AV:N/AC:L/AU:N/C:P/I:P/A:P)
EXPLOITDB-45439
Exploits This strike exploits a remote file inclusion vulnerability in WordPress Plugin Localize My Post 1.0. The vulnerability is due to improper sanitization of the "file" parameter. By successfully exploiting this vulnerability, a remote, unauthenticated attacker could retrieve arbitrary files from the target server.
7.5 E18-5mfv1 CVE-2018-16283
CVSS-7.5 (AV:N/AC:L/AU:N/C:P/I:P/A:P)
EXPLOITDB-45438
Exploits This strike exploits a remote file inclusion vulnerability in WordPress Plugin Wechat Broadcast 1.2.0. The vulnerability is due to improper sanitization of the "url" parameter. By successfully exploiting this vulnerability, a remote, unauthenticated attacker could retrieve arbitrary files from the target server.
7.5 E18-0lhp1 BID-105613
CVE-2018-3245
CVSS-7.5 (AV:N/AC:L/AU:N/C:P/I:P/A:P)
URL
Exploits An insecure deserialization vulnerability was found in Oracle WebLogic Server. This vulnerability is due to insufficient validation of serialized data within T3 requests. The vulnerability can be exploited by sending a specially crafted serialized object. The vulnerability does not require authentication. Successful exploitation can result in arbitrary code execution in the context of the user running the WebLogic server.
6.8 E18-0z6l1 CVSS-6.8 (AV:N/AC:L/AU:S/C:C/I:N/A:N)
EXPLOITDB-45597
Exploits This strike exploits a directory traversal vulnerability in FLIR AX8 Thermal Camera. The vulnerability is due to lack of input sanitization while downloading config files using the 'file' parameter in download.php. Successful exploitation results in the disclosure of arbitrary file contents from the target server.
6.8 E18-5o0j1 CVE-2018-18323
CVSS-6.8 (AV:N/AC:L/AU:S/C:C/I:N/A:N)
EXPLOITDB-45610
URL
Exploits This strike exploits a directory traversal vulnerability in CentOS Web Panel. The vulnerability is due to lack of parameter sanitization while executing service-related operations, with the service name passed as a GET parameter. Successful exploitation results in the disclosure of arbitrary file contents from the target server.
5.5 E18-5n7n1 CVE-2018-17283
CVSS-5.5 (AV:N/AC:L/AU:S/C:P/I:P/A:N)
URL
Exploits This strike exploits a blind SQL injection vulnerability in ManageEngine's OpManager application. The vulnerability is present in a API parameter for managing devices as a result of insufficient user input sanitization. Therefore, an attacker may be able to read arbitrary database records or even access system files, depending on the database's configuration.
5.0 E18-5lv31 CVE-2018-15535
CVSS-5.0 (AV:N/AC:L/AU:N/C:P/I:N/A:N)
EXPLOITDB-45271
Exploits This strike simulates a directory traversal attack on Responsive FileManager. The vulnerability can be exploited by issuing requests to the endpoint that handles AJAX calls. By exploiting it, an attacker may read arbitrary files from the filesystem.
5.0 E18-0g1q1 BID-97620
CVE-2017-6190
CVSS-5.0 (AV:N/AC:L/AU:N/C:P/I:N/A:N)
EXPLOITDB-41840
Exploits This strike exploits a directory traversal vulnerability present in multiple firmware versions of D-Link routers. The vulnerability can be exploited by performing GET requests under the path '/uir' of router's web interface. By exploiting it, an attacker may read arbitrary files from the filesystem which could lead further to credentials disclosure.
5.0 D18-0n5b2 CVE-2018-5391
CVSS-5.0 (AV:N/AC:L/AU:N/C:N/I:N/A:P)
URL
Denial This strike exploits a denial of service(DoS) vulnerability in IP fragments. The vulnerability is caused by the way how out-of-order IP fragments are handled from the kernel. A remote attacker could exploit this vulnerability by keep sending large amount crafted IP segments packet to the target server. Successful exploitation is able to exhaust target server's resource and lead to denial-of-service. *Note: Although this Strike sends the appropriate packets to trigger the vulnerability, in practice, we have found that actually crashing the endpoint requires a very high frame rate, higher than the Security Engine can provide. If you would like to try this at a higher rate, simply run this Strike against your DUT as you normally would, but take the capture from the port and then create a new test using the Recreate Component. Just import the PCAP you extracted and set the options "Send without modification" and "Unlimited Bandwidth" and finally "Use User based settings
5.0 D18-5l6g1 CVE-2018-14648
CVSS-5.0 (AV:N/AC:L/AU:N/C:N/I:N/A:P)
URL
Denial A denial of service vulnerability has been found in Red Hat 389 Directory Server. The vulnerability is due to improper parsing of of LDAP search queries in the 'do_search' method within slapd/search.c. A remote, unauthenticated attacker could exploit this vulnerability by sending crafted LDAP search queries to a vulnerable server. Successful exploitation of the vulnerability leads to denial of service conditions.