High Risk Vulnerabilities Addressed in Big Monitoring Fabric
Two high-severity vulnerabilities recently addressed in the Big Monitoring Fabric application could allow an attacker to remotely access affected systems.
Developed by Big Switch Networks, Big Monitoring Fabric is a hybrid cloud visibility and security solution designed to provide customers with the ability to monitor physical, virtual and cloud environments, all through a single dashboard.
Security researchers with Bishop Fox this week revealed that the solution is impacted by two security issues, namely a cross-site scripting (XSS) and a sensitive information disclosure flaw.
The first bug can be exploited by an unauthenticated remote attacker to gain administrative access to the Big Monitoring Fabric application, as well as SSH console access to the affected system.
The second vulnerability allows a low privilege read-only user to gain administrative privileges and SSH console access to the affected system.
Tracked as CVE-2019-19631, the second vulnerability would reveal valid session data for administrative users and RSA private keys, thus resulting in vertical and horizontal privilege escalation.
Users in read-only or admin groups could gain access to SSH RSA private keys and valid user session cookies, including those for administrators, through the API /api/v1/export endpoint.
“The SSH private keys appeared to be legitimate, but the team was unable to use them to gain further access with the keys. The admin session cookie was valid and read-only users could use it to perform vertical privilege escalation,” Bishop Fox security researchers explain.
The researchers then sent an API request to remove a low-privilege read-only user from the read-only group, then added the user to the admin group, and then authenticated to Big Monitoring Fabric with that user, which now had administrative privileges.
Once logged in, the researchers changed the default admin password, although they did not know the original password. The change impacted the SSH console admin authentication, allowing them to access it using the new credentials.