up.time 7.5.0 Superadmin Privilege Escalation Exploit
Title: up.time 7.5.0 Superadmin Privilege Escalation Exploit
Advisory ID: ZSL-2015-5251
Type: Local/Remote
Impact: Privilege Escalation
Risk: (4/5)
Release Date: 19.08.2015
Apache/2.2.29 (Win64) mod_ssl/2.2.29 OpenSSL/1.0.1j PHP/5.4.34
[06.08.2015] Vendor contacted.
[18.08.2015] No response from the vendor.
[19.08.2015] Public security advisory released.
[2] http://cxsecurity.com/issue/WLB-2015080120
[3] https://www.exploit-db.com/exploits/37885/
[4] https://packetstormsecurity.com/files/133252
[5] https://exchange.xforce.ibmcloud.com/vulnerabilities/105836
[13.09.2015] - Added reference [2], [3], [4] and [5]
Web: http://www.zeroscience.mk
e-mail: lab@zeroscience.mk
Advisory ID: ZSL-2015-5251
Type: Local/Remote
Impact: Privilege Escalation
Risk: (4/5)
Release Date: 19.08.2015
Summary
The next-generation of IT monitoring software.Description
up.time suffers from a privilege escalation issue. Normal user can elevate his/her privileges by sending a POST request seting the parameter 'userroleid' to 1. Attacker can exploit this issue using also cross-site request forgery attacks.Vendor
Idera Inc. - http://www.uptimesoftware.comAffected Version
7.5.0 (build 16) and 7.4.0 (build 13)Tested On
Jetty, PHP/5.4.34, MySQLApache/2.2.29 (Win64) mod_ssl/2.2.29 OpenSSL/1.0.1j PHP/5.4.34
Vendor Status
[29.07.2015] Vulnerability discovered.[06.08.2015] Vendor contacted.
[18.08.2015] No response from the vendor.
[19.08.2015] Public security advisory released.
PoC
uptime_pe.txtCredits
Vulnerability discovered by Gjoko Krstic - <gjoko@zeroscience.mk>References
[1] http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5254.php[2] http://cxsecurity.com/issue/WLB-2015080120
[3] https://www.exploit-db.com/exploits/37885/
[4] https://packetstormsecurity.com/files/133252
[5] https://exchange.xforce.ibmcloud.com/vulnerabilities/105836
Changelog
[19.08.2015] - Initial release[13.09.2015] - Added reference [2], [3], [4] and [5]
Contact
Zero Science LabWeb: http://www.zeroscience.mk
e-mail: lab@zeroscience.mk