CVE-2016-8580

9.8 CRITICAL

📋 TL;DR

This CVE describes PHP object injection vulnerabilities in AlienVault OSSIM and USM that allow attackers to execute arbitrary PHP code via magic methods in included classes. The vulnerability affects all systems running affected versions of AlienVault security products, potentially giving attackers complete control over the security monitoring platform.

💻 Affected Systems

Products:
  • AlienVault OSSIM
  • AlienVault USM
Versions: All versions before 5.3.2
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects multiple widget files in the web interface. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the AlienVault system leading to full administrative access, data exfiltration, and use as a pivot point to attack other network assets.

🟠

Likely Case

Remote code execution leading to installation of backdoors, credential theft, and disruption of security monitoring capabilities.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent exploitation attempts.

🌐 Internet-Facing: HIGH - AlienVault consoles are often exposed to manage remote sensors, making them prime targets.
🏢 Internal Only: HIGH - Even internally, the vulnerability allows privilege escalation and lateral movement within the network.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit code is available on Exploit-DB (ID: 40682). The vulnerability can be exploited without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.3.2

Vendor Advisory: https://www.alienvault.com/forums/discussion/7766/security-advisory-alienvault-5-3-2-address-70-vulnerabilities

Restart Required: Yes

Instructions:

1. Backup current configuration. 2. Download AlienVault 5.3.2 from official sources. 3. Follow AlienVault upgrade documentation for your deployment type. 4. Restart all AlienVault services after upgrade.

🔧 Temporary Workarounds

Network Access Restriction

linux

Restrict access to AlienVault web interface to trusted IP addresses only

iptables -A INPUT -p tcp --dport 443 -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -j DROP

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate AlienVault systems from untrusted networks
  • Deploy web application firewall (WAF) rules to block PHP object injection attempts

🔍 How to Verify

Check if Vulnerable:

Check AlienVault version via web interface or command line. Versions below 5.3.2 are vulnerable.

Check Version:

cat /etc/ossim/ossim_server | grep 'version'

Verify Fix Applied:

Verify version is 5.3.2 or higher using 'cat /etc/ossim/ossim_server' or web interface version check.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to widget files
  • PHP error logs showing unserialize() warnings
  • Web server logs with suspicious parameter values

Network Indicators:

  • HTTP requests containing serialized PHP objects in parameters
  • Traffic to AlienVault web interface from unexpected sources

SIEM Query:

source="alienvault" AND (uri="*widget*" OR params="*O:*") AND status=200

🔗 References

📤 Share & Export