CVE-2015-9246
📋 TL;DR
This vulnerability allows remote attackers to execute arbitrary code on Skybox Platform servers without authentication by uploading a malicious WAR archive containing a JSP file. The exploit targets the software update service endpoint, affecting all Skybox Platform installations before version 7.5.201.
💻 Affected Systems
- Skybox Platform
📦 What is this software?
Skybox Platform by Skyboxsecurity
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise allowing attackers to install backdoors, steal sensitive data, pivot to internal networks, or deploy ransomware across the organization.
Likely Case
Attackers gain full control of the Skybox Platform server, potentially accessing network security data, modifying configurations, and using the system as a foothold for lateral movement.
If Mitigated
If properly segmented and monitored, impact could be limited to the Skybox server itself with minimal data exposure.
🎯 Exploit Status
The advisory includes technical details sufficient for exploitation. The attack requires only HTTP access and file upload capability.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 7.5.201 or later
Vendor Advisory: https://www.skyboxsecurity.com/
Restart Required: Yes
Instructions:
1. Backup current configuration and data. 2. Download Skybox Platform version 7.5.201 or later from vendor portal. 3. Follow vendor upgrade documentation to apply the update. 4. Restart all Skybox services. 5. Verify the update was successful.
🔧 Temporary Workarounds
Disable Software Update Service
linuxTemporarily disable the vulnerable CollectorSoftwareUpdate endpoint
# Modify JBoss configuration to disable the service
# Consult Skybox documentation for specific service disablement procedures
Network Access Control
linuxRestrict access to the vulnerable endpoint using firewall rules
iptables -A INPUT -p tcp --dport 80 -m string --string '/skyboxview-softwareupdate/services/CollectorSoftwareUpdate' --algo bm -j DROP
iptables -A INPUT -p tcp --dport 443 -m string --string '/skyboxview-softwareupdate/services/CollectorSoftwareUpdate' --algo bm -j DROP
🧯 If You Can't Patch
- Isolate the Skybox Platform server in a dedicated network segment with strict inbound/outbound firewall rules
- Implement web application firewall (WAF) rules to block requests containing WAR file uploads or JSP execution attempts
🔍 How to Verify
Check if Vulnerable:
Check Skybox Platform version via admin interface or by examining installed packages. Versions below 7.5.201 are vulnerable.
Check Version:
grep -i version /opt/skyboxview/version.txt || skybox-cli --version
Verify Fix Applied:
Confirm version is 7.5.201 or higher and test that WAR file uploads to /skyboxview-softwareupdate/services/CollectorSoftwareUpdate are properly rejected.
📡 Detection & Monitoring
Log Indicators:
- HTTP POST requests to /skyboxview-softwareupdate/services/CollectorSoftwareUpdate with WAR file content
- Unusual file creation in /opt/skyboxview/thirdparty/jboss/server/web/work/jboss.web/localhost/
- Unexpected JSP compilation or execution events
Network Indicators:
- HTTP traffic to the software update endpoint with file upload patterns
- Outbound connections from Skybox server to suspicious external IPs post-exploitation
SIEM Query:
source="skybox_logs" AND (uri_path="/skyboxview-softwareupdate/services/CollectorSoftwareUpdate" OR file_path="*jboss.web/localhost*")